Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

SIM Swapping Blamed for Hacking of Twitter CEO’s Account

Hackers were able to post offensive messages from the Twitter account of Jack Dorsey, the social media company’s CEO, after they tricked his mobile services provider into handing over his phone number.

Hackers were able to post offensive messages from the Twitter account of Jack Dorsey, the social media company’s CEO, after they tricked his mobile services provider into handing over his phone number.

The hackers who took control of Dorsey’s account used it to post racist and anti-Semitic messages and even bomb threats. The tweets were removed by Twitter after roughly half an hour.

The attack has been attributed to Chuckling Squad, a hacker group that in the past targeted other high-profile individuals, particularly social media influencers.

Following the incident, Twitter clarified that its systems had not been compromised. The company stated, “The phone number associated with the account was compromised due to a security oversight by the mobile provider. This allowed an unauthorized person to compose and send tweets via text message from the phone number. That issue is now resolved.”

The technique used by the hackers is called a SIM swap or port-out scam. In these attacks, the attacker uses social engineering to convince a mobile phone operator to transfer the targeted individual’s phone number to their own SIM card. This can be used to bypass SMS-based two-factor authentication (2FA), but in the attack targeting the Twitter CEO it served a different purpose.

It allowed the hackers to post messages to Dorsey’s account through Cloudhopper, a mobile messaging technology provider that Twitter acquired back in 2010. Cloudhopper allows users to tweet by sending their message via SMS to a specific number. Since the hackers gained control of Dorsey’s phone number, they could easily post messages to his account without actually having to log in.

It’s worth noting that SMS messages can be used to perform various tasks on Twitter, including following or unfollowing a specific user, turning notifications on or off, and retweeting messages.

SIM swapping appears to be the Chuckling Squad’s favorite method for hijacking social media accounts and they have often targeted AT&T.

Advertisement. Scroll to continue reading.

“SIM swap scams have become a much more prominent and dangerous threat over the past year. It has been proven to be a shockingly easy way of subverting two-factor authentication by either successfully tricking carrier agents to move a user’s phone number to a new SIM card or through bribing one of these agents,” Ryan Rowcliffe, Lead of Solutions Architecture at SecureAuth, told SecurityWeek.

“Since carriers are the real targets in this scenario, they have a responsibility to look for suspicious patterns running through their call centers and customer service organizations in order to find fraudulent activity or reps who have been bribed by cybercriminals,” Rowcliffe added.

“At the very least, consumers should contact their phone carriers and request for additional security to be applied to their accounts such as not allowing account changes without a verification code delivered over a non-sms channel,” he said. “As an industry we should be working with phone carriers to find alternative ways to confirm possession of the phone prior to allowing changes to an account of this nature.”

Related: Nine Charged in SIM Hijacking Scheme

Related: Attackers Circumvent Two Factor Authentication Protections to Hack Reddit

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.