Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Twitter Says Hackers Accessed DM Inboxes in Recent Attack

Twitter on Wednesday revealed that attackers accessed the direct message (DM) inboxes of some of the accounts that were compromised in last week’s security incident.

Twitter on Wednesday revealed that attackers accessed the direct message (DM) inboxes of some of the accounts that were compromised in last week’s security incident.

The attack took place on July 15 and involved the abuse of internal Twitter systems and tools to gain access to high-profile accounts such as those of Jeff Bezos, Mike Bloomberg, Bill Gates, or Elon Musk, and post fake messages promoting a crypto-currency scam.

The messages encouraged account followers to send money to this Bitcoin address, claiming they would be returned double the amount. Over $100,000 were sent to the address within several hours.

Cryptocurrency exchange Coinbase told Forbes that the amount might have been much higher, but that it prevented more than 1,100 of its customers from sending approximately $280,000 worth of Bitcoin to the Twitter hackers’ wallet.

A few days after the incident, Twitter announced that the attackers targeted a total of 130 accounts, but that only some of them were actually compromised.

Over the weekend, the company revealed that the hackers managed to reset the passwords for 45 of the 130 targeted accounts and gain control of them, and that they also downloaded the data associated with 8 of these accounts.

“8 is the number of accounts where an archive of ‘Your Twitter Data’ was downloaded. This includes all of *your* account activity including DMs. None of the YTD downloads impacted Verified accounts,” the company said in a tweet.

On July 22, Twitter also revealed that the attackers accessed the DM inboxes of 36 of the 130 targeted accounts. One of these accounts is that of an elected official in the Netherlands, the social media platform reveals.

“To date, we have no indication that any other former or current elected official had their DMs accessed,” Twitter said in a blog update on Wednesday.

The attack is believed to be the work of hackers interested in the compromise of “original gangster” accounts, or OG accounts, who also engage in SIM swapping activities.

Investigative journalist Brian Krebs managed to link the incident to specific members of the OGUsers forum, some of whom were selling access to Twitter accounts for profit.

According to Krebs, a 21-year-old from the United Kingdom named Joseph O’Connor and a Michigan youngster who has been involved in SIM swapping before, along with several others members of the OGUsers forum, have inside knowledge of how the attack was carried out.

Related: Hackers Accessed, Downloaded Twitter User Data in Recent Attack

Related: Twitter Attack Was Work of Young Hacker Pals: NYT

Related: Industry Reactions to Twitter Hack: Feedback Friday

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.

Cybercrime

A new study by McAfee and the Center for Strategic and International Studies (CSIS) named a staggering figure as the true annual cost of...

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Management & Strategy

Tens of cybersecurity companies have announced cutting staff over the past year, in some cases significant portions of their global workforce.