Subscribe

0

  • Sign in with Email

By clicking the button, I accept the Terms of Use of the service and its Privacy Policy, as well as consent to the processing of personal data.

Don’t have an account? Signup

  • Bookmarks
  • My Profile
  • Log Out
  • NEWS
  • LEADERSHIP INSIGHTS
    • Interview
    • Opinion
    • Editors Blog
    • Features
    • DQ40YEARS
  • BUSINESS TECHNOLOGIES
  • DATA & AI
  • ESDM
  • UPSKILLING
  • BUSINESS SOLUTIONS
  • MORE
    • Annuals
    • Reviews
    • DQDEEPTECH
    • Events
    • Tech4Growth
    • DQConclave
    • TechSchools
  • Magazine
ad_close_btn
  • News
  • Business Technologies
  • DQDeepTech
  • Annuals
  • Events
  • Business Solutions
  • Interview
  • Module
  • Editors Blog
  • Opinion

Powered by :

You have successfully subscribed the newsletter.
Business Technologies

How Twitter CEO Jack Dorsey’s account was hacked using text-to-tweet feature

It turns out that hacking into the Twitter account of the company's CEO Jack Dorsey was as simple as using the SIM swap technique

author-image
DQINDIA Online
02 Sep 2019 06:44 IST

Follow Us

New Update
Twitter CEO Jack Dorsey Account hacked

The latest high-profile case of a Twitter account being compromised was none other than that of the company's CEO himself, Jack Dorsey. A group of hackers compromised the account and posted a stream of offensive messages.

Advertisment

The group used Twitter's text-to-tweet service to post the offensive messages. This service is provided by Cloudhopper, which allows users to tweet by sending their messages to a short number code. To avail of the service, users need only link their phone numbers to their Twitter accounts. Since users usually have their phones under their control, they can easily use the service. But, what happens when some unknown rogue gains control of your phone and starts abusing it?

Security oversight!

This is exactly what happened in Dorsey's case. The company admits that a 'security oversight' on their part, allowed the hackers to gain control of Dorsey's phone number and the subsequent barrage of messages. Such attacks are commonly called SIM swapping attacks. Here, the hackers convince the phone network operators (AT&T in Dorsey's case) to assign the phone number to a new phone which they control.

Advertisment

SIM swapping

SIM swapping is not a new technique and is widely used by hackers to bypass the two-factor authentication (2FA) to receive a one-time password (OTP). Most banks and payment service providers send an OTP to the users to authenticate themselves at the time of sign-in, or when making an online payment. When hackers gain control of the phone numbers, they can exploit them in many scary ways.

Cybercrime is now child's play

Advertisment

Although the hackers' run in the Twitter case was arrested within 15 minutes, it once again highlighted the poor security hygiene users follow when it comes to using online services. The incident also highlights the fact that perpetrating cybercrimes is now a child's play. Users can consider using a PIN code as a security measure to access their telecom accounts with the network providers and exercise adequate caution.

The article has been written by Neetu Katyal, Content and Marketing Consultant

She can be reached on LinkedIn.

Subscribe to our Newsletter! Be the first to get exclusive offers and the latest news
logo

Related Articles
Read the Next Article
Latest Stories
Subscribe to our Newsletter! Be the first to get exclusive offers and the latest news

Latest Stories
Latest Stories
    Powered by


    Subscribe to our Newsletter!




    Powered by
    Select Language
    English

    Share this article

    If you liked this article share it with your friends.
    they will thank you later

    Facebook
    Twitter
    Whatsapp

    Copied!