Business Standard

The big hack DEVANGSHU DATTA

-

The details of how the Twitter-bitcoin hack occurred this week are as yet unclear. What we know is that somebody gained access to about 130 verified and highly followed Twitter accounts, and used that access to scam an estimated $120,000 equivalent.

This list of hacked Twitter accounts included the accounts of Elon Musk, Bill Gates, Barack Obama, Apple, Uber, etc. The hacker or hackers sent out a series of identical messages. These essentiall­y solicited bitcoin donations into a couple of cryptocurr­ency wallets with a promise that the sender would reciprocat­e by sending back double the amount.

Mr Musk’s first scam-tweet, for instance, said he would double any payment sent to a given bitcoin wallet because he was feeling generous due to Covid-19. The other messages from other verified accounts were identical or similar, with minor variations, and at least one other bitcoin wallet mentioned.

These were all verified, blue tick twitter accounts, with two factor authentica­tion (2FA) enabled in many cases. According to Twitter, which shut down access to all verified accounts for a brief while, passwords were not compromise­d. The hacker or hackers gained access to the tools used within Twitter to spoof these messages.

How they did this is not yet clear. The hack may have been done by a rogue Twitter employee, or it may have been a smart hack into the Twitter system, or a social hack where someone conned Twitter ’s employees into giving them access. Some people fell for the scam and transferre­d bitcoins equivalent to about $120,000 to the referred wallets. Bitcoin traded at around $9,100 when the hack happened, so there were around 13 coins transferre­d to those wallets. Each coin can be broken up into multiple, unique micro-units, down to a Satoshi, which is one-hundred-millionth of a coin. So, there may have been a large number of people who fell for the scam.

Bitcoin is famous for its blockchain, the electronic ledger which can be accessed by anyone who cares to do so. Blockchain­s are difficult to hack. Every bitcoin transactio­n has to be verified by a majority of blockchain users, and every transactio­n ever made in bitcoin is recorded on the blockchain.

Using the blockchain we can look at a wallet and see the coins it holds. A transactio­n is confirmed when users agree that the unique coin “X” was in a given wallet “A”, and that X was transferre­d to another given wallet “B”, by using a unique cryptograp­hic key possessed by only the owner of that wallet A.

However, the bitcoin blockchain is anonymous by design. While anybody can verify a specific bitcoin has been transferre­d from wallet “A” to wallet “B”, the name of the owner of either wallet is not verifiable. Anybody can own any number of wallets. Indeed, anybody can make a wallet, or download any number of wallets for free, anonymousl­y from different services.

Since transactio­ns can only be made by the use of that unique key which is associated with each wallet, the owner of a wallet can remain anonymous. Finding the actual owner of the wallets used in the hack will be hard. Transfers of coins can be tracked, even though a smart hacker will layer in multiple transactio­ns to make this hard. Transfers of the hacked coins on crypto exchanges outside the jurisdicti­on of US l aw enforcemen­t will be impossible to stop. It’s very likely that the victims will never get their money back.

It’s clear there are ways of bypassing 2FA and taking control of verified accounts even at one of the world’s most high-profile tech companies. Whether this involves a social hack, or a smart guy bypassing security is almost irrelevant. There will always be routes into widely used systems, where a multitude of people (Twitter’s employees in this case) have access to system tools.

Twitter stores little in the way of sensitive personal informatio­n, even about verified accounts. The US also has a good set up for investigat­ing cybercrime­s. What happens in India if somebody hacks into Aadhaar or Aarogya Setu, where there is a truckload of sensitive personal informatio­n and no law for personal data protection?

 ??  ??

Newspapers in English

Newspapers from India