Close Menu
  • Latest News
    • Bitcoin
    • Ethereum
    • Altcoins
    • Meme Coins
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Gaming
  • Legal
    • Legal and Regulatory
    • Adoption
  • Analysis
  • Learn
    • Education
    • Wallets and Exchanges
  • Tools
    • Market Overview
    • Exchange Tool
  • INFO@FREE.CC
What's Hot

Donald Trump Announces Ceasefire with Iran Extended!

April 24, 2026

Zach Lowe: Celtics’ offense struggles since Tatum’s return, Luka Doncic’s historic scoring season, and LeBron’s pivotal role in Lakers’ surprise playoff success

April 24, 2026

Pyth Network to determine outcomes in Kalshi’s commodities expansion

April 24, 2026
Facebook X (Twitter) Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • Disclosure
Facebook X (Twitter) Instagram
Free.cc (Free Cryptocurrency)Free.cc (Free Cryptocurrency)
  • Latest News
    1. Bitcoin
    2. Ethereum
    3. Altcoins
    4. Meme Coins
    5. View All

    US Military Tests Bitcoin Node for Cybersecurity Research

    April 24, 2026

    Crypto Veterans Flip Bullish on Bitcoin As BTC Trades at $78,000 – Here Are Their Price Targets

    April 24, 2026

    The market repriced DeFi in just 48 hours

    April 24, 2026

    Pantera Capital Urges Satsuma To Dump All Bitcoin As Shares Collapse 99%

    April 23, 2026

    Ethereum Near Key Zone After 36% Gain

    April 24, 2026

    Bitmine Stakes 61,232 ETH Worth $142M

    April 22, 2026

    Ethereum Targets Lower Range As Resistance Zone Comes Into Play

    April 22, 2026

    Ethereum Price Rises, But On-Chain Data Signals Weak Demand —What’s Next for ETH?

    April 21, 2026

    What’s Happening Between ETH And The Financial Systems?

    April 24, 2026

    Could Ripple XRP Power Cross-Border Payments? Russia’s Early Tests Suggest Potential

    April 23, 2026

    Crypto Billionaire Justin Sun Files Lawsuit Against Trump-Linked World Liberty Financial Over ‘Wrongfully’ Frozen Tokens

    April 23, 2026

    Ethereum Price Rejected Above $2,400, Upside Momentum Starts To Fade

    April 23, 2026

    Meme Coin Market Faces Imbalance as Supply Rises, Demand Falls

    April 4, 2026

    Crypto Interest Rising Toward Meme Coin Sector

    January 9, 2026

    Memes Market Cap Adds $10B in Days: Fresh Capital or Dead-Cat-Bounce?

    January 5, 2026

    Meme Coin Market Surges Past $45B as Shiba Inu, PEPE, BONK Stage 54% Price Pump

    January 4, 2026

    Donald Trump Announces Ceasefire with Iran Extended!

    April 24, 2026

    Zach Lowe: Celtics’ offense struggles since Tatum’s return, Luka Doncic’s historic scoring season, and LeBron’s pivotal role in Lakers’ surprise playoff success

    April 24, 2026

    Pyth Network to determine outcomes in Kalshi’s commodities expansion

    April 24, 2026

    US Military Tests Bitcoin Node for Cybersecurity Research

    April 24, 2026
  • Tech
    1. Blockchain
    2. Security and Privacy
    3. View All

    Pyth Network to determine outcomes in Kalshi’s commodities expansion

    April 24, 2026

    The question isn’t whether privacy. It’s what sort of privacy

    April 24, 2026

    Ripple Joins BIS Taskforce For Cross Border Payments Expansion

    April 24, 2026

    ZetaChain Onboards Kimi and Alibaba Qwen as AI Models Go Cross-Chain

    April 23, 2026

    How crypto futures markets are feeding ‘scam coin’ insider pump and dumps

    April 22, 2026

    North Korean Blamed for $290m KelpDAO Crypto Heist

    April 21, 2026

    Chainalysis Flags Critical Blind Spot in DeFi Security as $292M Exploit Bypasses Burn Verification

    April 21, 2026

    Ripple’s Schwartz Flags DeFi Bridge Trade-Offs After KelpDAO Incident

    April 21, 2026

    Donald Trump Announces Ceasefire with Iran Extended!

    April 24, 2026

    Zach Lowe: Celtics’ offense struggles since Tatum’s return, Luka Doncic’s historic scoring season, and LeBron’s pivotal role in Lakers’ surprise playoff success

    April 24, 2026

    Pyth Network to determine outcomes in Kalshi’s commodities expansion

    April 24, 2026

    US Military Tests Bitcoin Node for Cybersecurity Research

    April 24, 2026
  • Web 3
    1. Gaming
    2. View All

    Zach Lowe: Celtics’ offense struggles since Tatum’s return, Luka Doncic’s historic scoring season, and LeBron’s pivotal role in Lakers’ surprise playoff success

    April 24, 2026

    GameFi is effectively dead as 93% of projects collapse

    April 24, 2026

    More than 90% of Web3 games failed after $15 billion boom as gamers never showed up: Caladan

    April 23, 2026

    Carbon 2.0: How dMRV Is Turning Carbon Credits Into Data-Driven Assets

    April 23, 2026

    Donald Trump Announces Ceasefire with Iran Extended!

    April 24, 2026

    Zach Lowe: Celtics’ offense struggles since Tatum’s return, Luka Doncic’s historic scoring season, and LeBron’s pivotal role in Lakers’ surprise playoff success

    April 24, 2026

    Pyth Network to determine outcomes in Kalshi’s commodities expansion

    April 24, 2026

    US Military Tests Bitcoin Node for Cybersecurity Research

    April 24, 2026
  • Legal
    1. Legal and Regulatory
    2. Adoption
    3. View All

    Donald Trump Announces Ceasefire with Iran Extended!

    April 24, 2026

    Tron’s Justin Sun sues Trump-linked World Liberty Financial over frozen assets

    April 24, 2026

    New York sues Coinbase, Gemini over prediction market offerings

    April 24, 2026

    Explosive Class Action Alleges False Advertising and Market Manipulation in Crypto AI Project

    April 23, 2026

    Cardano development teams wants almost $50 million for Bitcoin DeFi and Vision 2030

    April 24, 2026

    Oil tanker attacked after falling for crypto scam granting fake Strait of Hormuz safe passage

    April 21, 2026

    Six years after “DeFi Summer” is the sun already setting on the decentralized finance revolution?

    April 20, 2026

    Bitcoin network activity just hit an 8-year low — has Wall Street replaced retail in the market?

    April 19, 2026

    Donald Trump Announces Ceasefire with Iran Extended!

    April 24, 2026

    Zach Lowe: Celtics’ offense struggles since Tatum’s return, Luka Doncic’s historic scoring season, and LeBron’s pivotal role in Lakers’ surprise playoff success

    April 24, 2026

    Pyth Network to determine outcomes in Kalshi’s commodities expansion

    April 24, 2026

    US Military Tests Bitcoin Node for Cybersecurity Research

    April 24, 2026
  • Analysis

    SPK Price Explodes After Breakout, But Overbought Signals Flash Warning

    April 23, 2026

    US Bankers association push for 60 day pause to stop stablecoin rules going live

    April 23, 2026

    STABLE Price Jumps 15% After CEO Spotlight, But Is This Rally Sustainable?

    April 23, 2026

    ZEC Price Prediction: Zcash Retests Key Level

    April 23, 2026

    Monero Price Analysis: XMR Presses $400 Resistance

    April 23, 2026
  • Learn
    1. Education
    2. Wallets and Exchanges
    3. View All

    What’s on the Ethereum Roadmap: Glamsterdam, Hegota and Beyond

    March 30, 2026

    What Is Bluesky? The Decentralized Social Media Rival to Elon Musk’s X

    March 27, 2026

    What Is Strategy (MSTR)? The Bitcoin Treasury Company

    February 21, 2026

    What Are Prediction Markets? How Polymarket, Kalshi and Myriad Work

    February 13, 2026

    Over 80% of Bitcoin ETF assets hit Coinbase custody choke point with $74B at risk

    April 13, 2026

    FTX begins $2.2B payout. Can Bitcoin absorb another liquidity test?

    March 31, 2026

    BlinkEx investment platform infrastructure – matching, risk controls, reliability

    March 21, 2026

    Over $2B in “lost” Bitcoin to hit markets this month creating sell pressure within fragile $67k–$74k range

    March 20, 2026

    Donald Trump Announces Ceasefire with Iran Extended!

    April 24, 2026

    Zach Lowe: Celtics’ offense struggles since Tatum’s return, Luka Doncic’s historic scoring season, and LeBron’s pivotal role in Lakers’ surprise playoff success

    April 24, 2026

    Pyth Network to determine outcomes in Kalshi’s commodities expansion

    April 24, 2026

    US Military Tests Bitcoin Node for Cybersecurity Research

    April 24, 2026
  • Tools
    • Market Overview
    • Exchange Tool
  • INFO@FREE.CC
Free.cc (Free Cryptocurrency)Free.cc (Free Cryptocurrency)
Home»Security and Privacy»Twitter Hack Spurred Copycats, But Other Businesses Don’t Have to Fall Prey
Twitter Hack Spurred Copycats, But Other Businesses Don’t Have to Fall Prey
Security and Privacy

Twitter Hack Spurred Copycats, But Other Businesses Don’t Have to Fall Prey

November 1, 2025No Comments6 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

A 17-year-old was apparently the ringleader of a trio of young hackers behind the July hijacking of dozens of high-profile Twitter accounts. Not even old enough to rent a car, the hackers perpetrated a Bitcoin scam that caused the cyber world to take a good look at how a motley band of mere youths could bypass the robust cybersecurity protocols of one of the world’s largest tech companies. Inspired by the hack, copycats are now using the same tactics to target dozens of other companies.

There must be something fundamentally wrong with account security given such an attack on a global tech giant with top-notch security practices by penetrating what should have been the highest level of permissions to critical internal systems through psychological manipulation tactics known as social engineering.

The fundamental flaw is our reliance on passwords, which in turn rely on human beings to remember and manage in order to guard against threats. 

The anatomy of the Twitter scam: A classic case of privileged account takeover  

As a global tech leader, Twitter employs the kinds of robust security practices one would expect including: Privileged Access Management (PAM) protocols, multi-factor authentication (MFA), zero tolerance for misuse of credentials or tools, active monitoring for misuse, and regular permission audits

Still, in mid-July, a series of high-profile Twitter accounts tweeted out requests for Bitcoin donations. Apple, Uber, former President Barack Obama, Presidential nominee Joe Biden, Bill Gates, Kim Kardashian-West, and Elon Musk— were just a few of the compromised accounts 

While the final assault (the Bitcoin scam) caused a media frenzy, it’s actually the initial catalyst of the fraud that should be of highest concern for other companies. Through the seemingly incredulous means of a phone call, the fraudsters tricked a small group of Twitter employees to hand over their credentials to access Twitter’s internal systems.

See also  US Indicts Brit Over SIM Swap Crypto Theft

The highly-targeted spear-phishing attack ultimately enabled the attacks access to masquerade as legitimate access-holder and bypass two-factor authentication protections to ultimately take over the VIP user accounts. 

To succeed, hackers needed to obtain access to both Twitter’s internal networks and specific employee credentials to gain access to internal support tools.  

Once the cyber-criminals figured out which employees had privileged access, they targeted those specific employees to access account support tools. Hijacking these tools, the attackers then targeted 130 high-profile Twitter accounts.

The attackers were able to initiate a password reset for 45 of those accounts, enabling them to log in to the accounts, and  tweet away on the handle of the rich and famous, urging the public to send their bitcoin to fraudulent websites. In total, the scammers managed to receive the cash equivalent of $121,000 in bitcoin payments.

Current tools cannot counteract the insider threat 

In the wake of the Twitter scam, strong suspicions emerged that a malicious insider had been involved. Not just a concern for high-profile organizations, all companies face malicious insiders – a particularly challenging threat to protect against. After all, an organization can’t function without a certain amount of trust when it comes to their own employees.   

In recent years, multiple incidents involving malicious insiders have been reported. Some were personally motivated. For example, Facebook employees used their privilege to access user data to stalk women and Snapchat workers had abused a tool called SnapLion that provided information on users. Some are financially driven as in the case of the 2019 Capital One insider attack that compromised personal data of 100 million customers.

See also  #Halloween Horrors: The Scariest Security Threats Affecting Businesses

Finally, some are politically motivated, demonstrated in the recent rise of state actors and spy operations targeting tech giants in Silicon Valley and Twitter employees found last year spying on users on behalf of the Saudi regime. 

While Privileged Access Management has changed the way enterprises protect access to critical applications and therefore organization-wide security, they are not foolproof. Even with a strong combination of security tools like Data Loss Prevention (DLP), real-time access monitoring, and zero-trust methodologies, the very existence of privileged accounts is a huge liability. The consequences of privileged identity exposure are potentially catastrophic, as the Twitter hack demonstrated.

Defending accounts in the cloud era 

Corporate account takeover can have huge ramifications in today’s interconnected world amid the growing prevalence of enterprise cloud services. The Twitter hack is a prime example of the multiple levels of damage that account takeover attacks can have.

Shortly after Twitter’s incident response team became aware of the ongoing situation, pre-emptive measures were taken to restrict functionality for many verified accounts on Twitter. The quick response may have seemed dramatic, but it granted Twitter reasonable success in minimizing the damage. However, most companies have nowhere near the resources of the social media giant when it comes to damage control, technically or in terms of public relations. 

A similar, or even much simpler attack on a smaller firm can have devastating consequences, even if their whole operation is cloud-based. In fact, some 70% of organizations using public cloud services reportedly experienced a security incident in the past year while the average time to identify and contain a breach is 280 days.

See also  Satacom Malware Campaign Steals Crypto Via Stealthy Browser Extension

In our increasingly cloud-based economy, many organizations tend to blindly trust the default security level their cloud providers offer, unfortunately without a good enough reason.

As long as humans are involved, breaches are inevitable 

While Twitter continually updates and improves its tools, controls, and processes, the July attack succeeded anyways, because it targeted the weakest element in any security regime: humans. 

The attack relied on exploiting human vulnerabilities to gain access to Twitter’s internal systems. The attackers succeeded at manipulating a small number of employees and hijacked their credentials to access Twitter’s internal systems, including bypassing two-factor protections to initiate a password reset.

Twitter has pledged to address the threat of phishing with multiple company-wide exercises, however that is a band-aid approach that does not eliminate the reliance on human beings to defend against what could otherwise be preventable cyber threats. Phishing campaigns succeed for one simple reason: they target one fundamental vulnerability – the password. 

The very existence of passwords means that there will always be a target for phishers, but removing passwords from the picture and replacing them with passwordless authentication mechanisms means eliminating the threat of phishing at its root.

There is no reason to continue to use fundamentally vulnerable passwords for personal use, for corporate accounts and especially for sensitive, privileged accounts. 

Businesses Copycats Dont Fall Hack Prey Spurred Twitter
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

How crypto futures markets are feeding ‘scam coin’ insider pump and dumps

April 22, 2026

North Korean Blamed for $290m KelpDAO Crypto Heist

April 21, 2026

Chainalysis Flags Critical Blind Spot in DeFi Security as $292M Exploit Bypasses Burn Verification

April 21, 2026

Ripple’s Schwartz Flags DeFi Bridge Trade-Offs After KelpDAO Incident

April 21, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Sorare Migrates to Solana, Abandoning Ethereum L2 StarkEx

October 12, 2025

Crypto Firm Kraken Calls the Cops After Researchers Attempt “Extortion

September 21, 2025

Stay ahead with the latest crypto news, market updates, blockchain insights, and trends. Your trusted source for everything happening in the digital asset world.


We're social. Connect with us:

Facebook X (Twitter) Instagram Pinterest YouTube
Top Insights

Donald Trump Announces Ceasefire with Iran Extended!

April 24, 2026

Zach Lowe: Celtics’ offense struggles since Tatum’s return, Luka Doncic’s historic scoring season, and LeBron’s pivotal role in Lakers’ surprise playoff success

April 24, 2026

Pyth Network to determine outcomes in Kalshi’s commodities expansion

April 24, 2026
Get Informed

Subscribe to Updates

Get the latest creative news From Free.cc directly in your Inbox!

  • Contact
  • Privacy Policy
  • Terms & Conditions
  • Disclosure
© 2026 free.cc - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.