Saturday, April 10, 2021
  • BSides Philly 2020 – Shail Patel’s ‘How I Pwned The ICS Data During My Internship’
  • CommitStrip ‘The Secret Of A Successful Code Review’
  • BSides Philly 2020 – Chris Myers’ ‘Home Labs Without Hardware Building In The Cloud’
  • Security News In Review: Could IcedID Be the New Emotet?
  • The Physical Impact of Manufacturing Cyber Threats

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming
    • On-Demand
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library
  • Related Sites
    • MediaOps Inc.
    • DevOps.com
    • Container Journal
    • Digital Anarchist
    • SweetCode.io
  • Media Kit

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Security Bloggers Network 

Home » Security Bloggers Network » Account Takeover Attacks Cause Chaos @ Twitter

Account Takeover Attacks Cause Chaos @ Twitter

by Stacy Shelley on July 16, 2020
On Tuesday afternoon, dozens of high-profile Twitter accounts were hijacked to promote cryptocurrency scams. Threat actors took over the accounts of Elon Musk, Bill Gates, Barack Obama, Jeff Bezos, and many others. Corporate Twitter accounts were also hijacked, including those belonging to cryptocurrency companies. What does this mean for enterprises and their security teams?
 
Threat actors claiming to be involved in the account takeovers have indicated the hack was carried out by
paying off a Twitter employee with access to internal systems. In response, Twitter locked down the affected accounts and removed the offending posts. They are investigating the full extent of the breach.
 
 
Elon Musk’s Twitter account was one of many taken over by cybercriminals to promote cryptocurrency scams.
 
Tuesday’s Twitter hack is a high profile demonstration of threat actors targeting and using social media accounts as part of their scams. Security leaders should expect questions about it. Various corporate stakeholders including senior executives and board members will want to know the risk this incident poses. They will also need to know what, if any, additional steps are being taken to mitigate the risk. 
 
When a social media platform is compromised in this way, accounts can be taken over regardless of how social media users authenticate and protect their accounts. Enterprises can mitigate the risk by focusing on detection and response.
Monitoring social media accounts of their brands and executives for suspicious behavior (such as promoting cryptocurrency scams) can identify incidents early. Having a response process in place that defines how to escalate the account takeover, take down offending posts, and restore account ownership will expedite remediation and mitigate the impact.
 
That said, it is rare that threat actors compromise a social media platform itself. Attacks take place on social media all the time that are just as impactful (if not more). Threat actors frequently
impersonate brands and
individuals on social media to carry out fraud. They increasingly use social media to distribute malware and phishing attacks. Social media is also prime territory for
publishing leaked data, stolen credentials, PII, etc.
 
This Twitter hack brings social media threats into focus. It is a wakeup call for many enterprises that have overlooked social media risk. And it is an opportunity for security leaders to take proactive steps to improve their organization’s digital risk posture. 
 
Additional Resources:
  • Executive Impersonation Techniques on Social Media
  • Data Leakage on Social Media: Credit Card Info, Confidential Docs
  • Social Media Platforms Latest Channels used to Leak Sensitive Data
  • Threat Actors Impersonate Brands on Social Media for Malicious Purposes
  • On-Demand Webinar: Social Media Intelligence – Real Threats, Real Impact


Recent Articles By Author
  • Most Phishing Attacks Use Compromised Domains and Free Hosting
  • OSINT: Mapping Threat Actor Social Media Accounts
  • Using Social Media OSINT to Determine Actor Locations
More from Stacy Shelley

*** This is a Security Bloggers Network syndicated blog from The PhishLabs Blog authored by Stacy Shelley. Read the original post at: https://info.phishlabs.com/blog/account-takeover-attacks-cause-chaos-twitter

July 16, 2020July 16, 2020 Stacy Shelley account takeover, Digital Risk Protection, executive impersonation, Social Media Monitoring, Social Media Threats
  • ← DevOps Industry Veterans Team Up with ZAP Founder Simon Bennetts to Deliver AppSec to Developers
  • Those Pesky Rus… →

TechStrong TV – Live

Watch latest episodes and shows

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy

Most Read on the Boulevard

Fileless Malware, Endpoint Attacks on the Rise
Facebook Sucks: Huge 500M-User Breach ‘Is Your Fault’
Time to Retire a Cybersecurity Cliché
Breach Clarity Data Breach Report: Week of April 5
Race to Cloud Continues Despite Security Concerns
Tom Cruise, TikTok and Fraud: How to combat DeepFakes
Hybrid Work: Benefits, Disadvantages and Other Considerations
Getting to Know DevSecOps
LinkedIn and LOLBINs
Education In The Crosshairs Of Cyberattacks | Avast

Upcoming Webinars

Tue 13

How to Build Safer Cloud-Native Applications

April 13 @ 3:00 pm - 4:00 pm
Wed 14

AppSec Risk: You Can’t Manage What You Can’t Measure

April 14 @ 1:00 pm - 2:00 pm
Thu 15

The Age of Collaborative Security

April 15 @ 11:00 am - 12:00 pm
Fri 16

Expect More From Your AppSec Vendor

April 16 @ 1:00 pm - 2:00 pm
Wed 21

Managing Open Policy Agent at Scale – Styra DAS

April 21 @ 3:00 pm - 4:00 pm
Thu 22

A New Approach to Secure Web Gateways

April 22 @ 11:00 am - 12:00 pm
Mon 26

The Kubernetes Network (Security) Effect

April 26 @ 9:00 am - 10:00 am
Mon 26

Application Security: Moving at the Speed of DevOps

April 26 @ 1:00 pm - 2:00 pm
May 05

Managing Permissions and Entitlements is at the Core of a Zero Trust Model in the Cloud

May 5 @ 3:00 pm - 4:00 pm

More Webinars

Download Free eBook

The Dangers of Open Source Software and Best Practices for Securing Code

Recent Security Boulevard Chats

  • Cloud, DevSecOps and Network Security, All Together?
  • Security-as-Code with Tim Jefferson, Barracuda Networks
  • ASRTM with Rohit Sethi, Security Compass
  • Deception: Art or Science, Ofer Israeli, Illusive Networks
  • Tips to Secure IoT and Connected Systems w/ DigiCert

Industry Spotlight

Secrets Detection: An Emerging AppSec Category
Application Security AppSec Cloud Security Cybersecurity Data Security Endpoint Industry Spotlight Security Boulevard (Original) 

Secrets Detection: An Emerging AppSec Category

April 8, 2021 Mackenzie Jackson | 2 days ago 0
Breach Clarity Data Breach Report: Week of April 5
Cybersecurity Data Security Industry Spotlight Security Awareness Security Boulevard (Original) Threats & Breaches 

Breach Clarity Data Breach Report: Week of April 5

April 7, 2021 Kyle Marchini | 3 days ago 0
Smart IAM: The Key to Seamless Sign-Ons
Cybersecurity Identity & Access Industry Spotlight Mobile Security Network Security Security Boulevard (Original) 

Smart IAM: The Key to Seamless Sign-Ons

April 6, 2021 Dave Taku | 4 days ago 0

Top Stories

Facebook Sucks: Huge 500M-User Breach ‘Is Your Fault’
Analytics & Intelligence Application Security AppSec Cloud Security Cyberlaw Cybersecurity Data Security Featured Governance, Risk & Compliance Identity & Access Incident Response News Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Facebook Sucks: Huge 500M-User Breach ‘Is Your Fault’

April 8, 2021 Richi Jennings | 2 days ago 0
Apple Fiddles While App Store Burns: $1M Bitcoin Scam FAIL
Analytics & Intelligence Application Security Cybersecurity Data Security Endpoint Featured Identity & Access Malware Mobile Security News Security Boulevard (Original) Spotlight 

Apple Fiddles While App Store Burns: $1M Bitcoin Scam FAIL

April 5, 2021 Richi Jennings | Apr 05 0
Ubiquiti Accused of Lying to Help Stock Price
Analytics & Intelligence Application Security Cloud Security Cyberlaw Cybersecurity Data Security Featured Identity & Access Incident Response IoT & ICS Security Network Security News Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Ubiquiti Accused of Lying to Help Stock Price

April 1, 2021 Richi Jennings | Apr 01 0

Security Humor

via   the textual amusements of  Thomas Gx , along with the Illustration talents of  Etienne Issartia  and superb translation skillset of  Mark Nightingale  - the creators of   CommitStrip  !

CommitStrip ‘The Secret Of A Successful Code Review’

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: info@securityboulevard.com

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy
  • DMCA Compliance Statement

Other Mediaops Sites

  • Container Journal
  • DevOps.com
  • DevOps Connect
  • DevOps Institute
Copyright © 2021 MediaOps Inc. All rights reserved.
Our website uses cookies. By continuing to browse the website you are agreeing to our use of cookies. For more information on how we use cookies and how you can disable them, please read our Privacy Policy.