قالب وردپرس درنا توس
Home / Business / Hackers use SIM switches to break Twitter accounts

Hackers use SIM switches to break Twitter accounts



  • Twitter founder and CEO Jack Dorsey's official Twitter account was hacked on Friday, following a number of other strange incidents where YouTube celebrities and influencers were similarly targeted. ] a phone owned by the hackers.
  • Mobile phone users can protect themselves from a similar attack by putting PINs in their accounts, or using a third-party two-factor authentication system, according to Wired.
  • Visit the Business Insider website for more stories.

Twitter founder and CEO Jack Dorsey's official Twitter account was hacked on August 30, shocking his followers as his account spewed racial, anti-Semitic tweets and more offensive content, before all tweets and retweets were eventually removed.

According to an initial Twitter statement allowed a "security oversight" of the vendor hackers. Twitter's communications group later clarified that "the phone number associated with the account was compromised due to a security oversight by the mobile provider ."

The hacking appears to be from the same group that attacked a number of accounts belonging to YouTube celebrities last week on Twitter, including beauty vlogger James Charles, Shane Dawson and King Bach.

Daniel "Keemstar" Keem, who has communicated with the hackers on several occasions, suggested in a tweet that the telephone service provider was blamed, stating that the company inadvertently allowed hackers to call in and ask for a SIM card change on behalf of high-profile accounts.

Read more : James Charles is the last YouTuber to be hacked on Twitter by the same group or person going "lobster"

Antonio Villas-Boas / Business Insider

The tactic matches Twitter's explanation of the Dorsey hack, which the company said was caused by hackers who used a phone number to send tweets through text messages.

Such a tactic is often known as "SIM hacking." It occurs when a hacker deceives a mobile operator to transfer the victim's mobile number to a new phone – one owned by the hackers. Hackers can then use Twitter & # 39; s "text-to-tweet" service to post tweets to the victim's account.

Wired reported that smartphone users can protect themselves from switching SIMs by adding a passcode to their transport account or using a third-party app – such as Google Authenticator and Authy – for two-factor authentication.


Source link