Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Twitter Says Hackers Accessed Dutch Politician’s Inbox

Twitter says an elected Dutch official was among 36 account holders whose direct message inboxes were accessed in a recent high-profile hack.

Twitter says an elected Dutch official was among 36 account holders whose direct message inboxes were accessed in a recent high-profile hack.

The politician, anti-Islam lawmaker Geert Wilders, said Thursday that he was informed by Twitter that his account was compromised by a hacker, who posted tweets on his account and sent false direct messages, or DMs, in his name.

The hacker ”indeed also got full access to my DM’s which of course is totally unacceptable in many ways,” Wilders said.

The social network revealed more details of the intrusion late Wednesday after completing a review of the 130 accounts that were targeted.

The U.S. tech company was embarrassed by last week’s hack, which compromised the accounts of some of its most high profile users, including world leaders, celebrities and tech moguls. The hack appeared designed to lure their Twitter followers into sending money to an anonymous Bitcoin account.

Of the 130 accounts, “36 is the number of accounts where the attacker took control of the account and viewed the DM inbox,” the company said.

“To date, we have no indication that any other former or current elected official had their DMs accessed,” the company said through its Twitter Support account

Wilders signaled that he got back control of his account on July 17, by tweeting “Back online!” with the hashtag #NoMoreHack.

Advertisement. Scroll to continue reading.

Wilders said his inbox contained messages received during his decade using the social media platform from people critical of Islam or Middle East regimes, including from within countries like Iran, Saudi Arabia and Syria.

“I do hope they will not be in danger if their identity would be exposed because of this hack,” Wilders said. “I deleted most of them but maybe some were left there for the hacker to see and copy.” He added that he rarely wrote direct messages himself.

The company has previously said the incident was a “coordinated social engineering attack” that targeted some of its employees with access to internal systems and tools. They were then used to take control of many high-profile and verified accounts. The attackers were able to reset passwords for 45 accounts, and then login and tweet from them.

Twitter also confirmed that another eight accounts had their user data archive, including direct messages, downloaded through the “Your Twitter Data” tool, but none of those accounts were verified.

Related: Hackers Accessed, Downloaded Twitter User Data in Recent Attack

Related: Twitter Attack Was Work of Young Hacker Pals: NYT

Related: Industry Reactions to Twitter Hack: Feedback Friday

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...