Twitter verified it was breached final Wednesday via a social engineering attack, which led to the compromise of various high-profile accounts

Previous Wednesday, the social media business uncovered a breach had allowed cybercriminals to achieve access to dozens of accounts, including individuals of previous President Barack Obama, previous Vice President Joe Biden, Amazon CEO Jeff Bezos and Tesla and SpaceX CEO Elon Musk. The accounts ended up utilized to tweet bitcoin frauds.

In a blog site post Saturday, Twitter verified its original conclusions that a social engineering attack of some form took spot which allowed the attackers to achieve access to administrative devices and tools within just the business. Nonetheless, the business did not specify what variety of social engineering attack was utilized in the breach. Twitter did not reply to SearchSecurity’s requests for comment.

The danger actors utilized the access to concentrate on 130 accounts, and they successfully hijacked 45 of individuals accounts by switching the account e-mail addresses. Soon after several in the infosec local community expressed problem that personal knowledge for individuals accounts may well been uncovered, Twitter uncovered that the attackers did achieve access to personal knowledge for “up to 8 of the Twitter accounts concerned,” using Twitter’s “Your Twitter Facts” device to down load facts such as immediate messages. Twitter did not detect the 8 accounts but did say each account compromised in this way was a non-verified account.

Nonetheless, the business mentioned the attackers may well have been capable to check out “extra facts” for the hijacked verified accounts past contact e-mail addresses and telephone quantities. “Our forensic investigation of these things to do is continue to ongoing,” the business mentioned.

In accordance to third-bash analysis from Elliptic, the hackers made off with about $121,000 via the bitcoin frauds. A separate post from Elliptic mentioned that danger actors likely utilized Wasabi Wallet, “a variety of bitcoin wallet that can be utilized to disguise transaction trails, making it complicated for legislation enforcement investigators or economical institutions to trace funds on the blockchain,” in get to launder proceeds from the hack.

In addition to tweeting bitcoin frauds, Twitter mentioned the attackers may well have attempted to sell some of the usernames for the stolen accounts.

Previous week’s Twitter breach is reminiscent of two incidents in 2009 where by danger actors compromised administrative accounts at the business. In the 1st incident, a hacker utilized a dictionary attack to get a weak administrative password for the company’s internal devices, hijacking various accounts, including the individuals of Fox News and then-President Barack Obama, and tweeted frauds. In the second incident, a danger actor compromised a Twitter employee’s e-mail account where by two plaintext passwords ended up stored the attacker utilized a variation of a person of the uncovered passwords to achieve access to an admin account, which enabled them to reset passwords for at minimum a person Twitter account.

The U.S. Federal Trade Fee (FTC) filed a grievance versus Twitter around the incidents, boasting the business failed to protect against the breaches since of lax controls around admin qualifications and inadequate password management practices. In 2011, the FTC and Twitter agreed to a settlement underneath which the social media business pledged to put into action an company security application that would be reviewed by an impartial auditor each other yr for 10 several years.

Even though Twitter has taken measures in new several years to enhance internal and account security, the social media business has expert various incidents involving insiders as well. In 2017, a Twitter consumer assist staff deactivated President Donald Trump’s account on his final working day at the business (the staff mentioned the deactivation was accidental). In 2019, the Department of Justice charged two previous Twitter workforce for allegedly spying on behalf of the Saudi Arabian governing administration according to the DOJ, the two workforce utilized their access at Twitter to get nonpublic facts about specific buyers.

In its blog site post, Twitter outlined various objectives, including “more securing our devices to protect against long run attacks” and applying extra business-huge security awareness teaching to protect against long run social engineering attacks.

“We are acutely mindful of our duties to the persons who use our services and to culture more generally,” the business mentioned its blog site post. “We are ashamed, we’re disappointed, and more than just about anything, we’re sorry. We know that we ought to do the job to get back your belief, and we will assist all initiatives to deliver the perpetrators to justice.”