Hacking

Twitter reveals that hackers also downloaded data from eight compromised accounts

The social media giant Twitter confirmed that hackers compromised 130 accounts in last week hack and downloaded data from eight of them.

Last week, the social media platform Twitter has suffered one of the biggest cyberattacks in its history, hackers breached a number of high-profile accounts, including those of Barak Obama, US presidential candidate Joe Biden, Amazon CEO Jeff Bezos, Bill Gates, Elon Musk, Uber, and Apple.

Twitter explained is was victim of a”coordinated social engineering attack” against its employees who gave attackers the access to its internal tools.

All the accounts were compromised simultaneously and threat actors used them to promote a cryptocurrency scam. The attackers posted messages urging the followers of the hacked accounts to send money to a specific bitcoin wallet address to receive back larger sums.

“Everyone is asking me to give back, and now is the time,” reads a messages posted from Bill Gates’ Twitter account said. “You send $1,000, I send you back $2,000.”

Experts also noticed that attackers have changed the email addresses associated with the accounts to delay the response to the hijack.

Now Twitter provided an update on the security incident confirming that attackers targeted certain Twitter employees through a social engineering scheme.

The hackers targeted 130 accounts and were able to take control of 45 of them sending out some posts on behalf of the owners, and downloaded data from eight.

“The attackers successfully manipulated a small number of employees and used their credentials to access Twitter’s internal systems, including getting through our two-factor protections. As of now, we know that they accessed tools only available to our internal support teams to target 130 Twitter accounts.” reads the update provided by Twitter. “For 45 of those accounts, the attackers were able to initiate a password reset, login to the account, and send Tweets.”

Below the info provided by Twitter for the 130 accounts that were targeted by the hackers:

  • Hackers did not view previous account passwords, as those are not stored in plain text or available through the tools used in the attack.
  • Hackers only accessed personal information associated with compromised accounts, including email addresses and phone numbers. This data is available to some users of Twitter’s internal support tools.
  • In cases where an account was taken over by the attacker, they may have been able to view additional information.

For up to eight of the Twitter accounts targeted by the hackers, the intruders also downloaded the account’s information through the Twitter’s “Your Twitter Data” tool.

“For up to eight of the Twitter accounts involved, the attackers took the additional step of downloading the account’s information through our “Your Twitter Data” tool.” continues the update.

“This is a tool that is meant to provide an account owner with a summary of their Twitter account details and activity. We are reaching out directly to any account owner where we know this to be true. None of the eight were verified accounts.”

Twitter pointed out that its incident response team immediately acted once discovered the hack, it secured and revoked access to internal systems to lock out the attackers. The company decided to share online only a few details on its remediation procedure to protect its effectiveness. Twitter plans to provide more technical details about the remediation procedure, in the future.

The social media network is continuing to investigate this incident along with law enforcement.

This week the New York Times published a report that revealed that hackers breached employee a Twitter’s internal Slack messaging channel where they found credentials for the backend systems of the social network.

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, social engineering)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

16 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

17 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

22 hours ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

1 day ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.