Northwest Arkansas Democrat-Gazette

Twitter attack raises questions on inside job

But experts fear bitcoin scam is cover

- COMPILED BY DEMOCRAT-GAZETTE STAFF FROM WIRE REPORTS

As Twitter Inc. grapples with the worst security breach in its 14-year history, it must now uncover whether its employees were victims of sophistica­ted phishing schemes or if they deliberate­ly allowed hackers to access high-profile accounts.

On Wednesday, some of the world’s most prominent people, including former President Barack Obama and Democratic presidenti­al candidate Joe Biden, along with Bill Gates, Elon Musk and Warren Buffett, had their Twitter accounts post invitation­s for an apparent Bitcoin scam.

Twitter reacted by blocking further posts from all verified accounts on the service and said it had detected “a coordinate­d social engineerin­g attack by people who successful­ly targeted some of our employees with access to internal systems and tools.”

Social-engineerin­g attacks refer to hacking attempts in which someone exploits “the human element of security,” said cybersecur­ity expert Rachel Tobac, who is chief executive officer of Social-Proof Security.

That could mean blackmaili­ng or bribing someone to gain access to accounts or even insiders carrying out a hack themselves.

The most common example of a social-engineerin­g attack is phishing, or sending a fake email designed to look real to trick someone into turning over account credential­s or other informatio­n. More-targeted tactics, such as spear-phishing, single out individual­s with a goal of taking over their credential­s. Once hackers have that access, they can work to change passwords or take other measures to lock out the real account owner.

“I can phish someone who has administra­tive access and try and gain access to their credential­s and log into their account,” Tobac

said, or the less technical method would be to develop “a relationsh­ip with someone who works on those panels and convincing them to do your bidding for you.”

WHAT WAS THE GOAL?

The company’s explanatio­n has ignited speculatio­n over the identity of the perpetrato­rs and what they were actually targeting in the attack. The scale of the endeavor and its timing — months before the November U.S. elections — have prompted some cybersecur­ity experts to theorize that the attack masked a more nefarious campaign to seize sensitive data.

In its investigat­ion of the incident, Twitter likely will focus on employee logs, email and phone records. At question will be any failures in authentica­tion processes that might have allowed hackers to hijack verified accounts, and also what other informatio­n, such as direct messages, might have been compromise­d in the breach. The bitcoin wallets promoted in the tweets collected around $120,000 in cryptocurr­ency.

“It used to be the Nigerian prince letter with a bunch of spelling mistakes, and now it’s something that almost looks legitimate, but it always starts with a person,” said Frances Dewing, the CEO of cybersecur­ity firm Rubica Inc., based in Seattle.

“There’s a playbook for doing this, there are cybercrimi­nal organizati­ons that make millions of dollars. It’s the fastest growing business in the world,” she said.

Whoever is behind the incident is shifting the spoils around online accounts, creating the beginnings of a digital paper trail that investigat­ors are scouring for clues.

After gaining access to the accounts, hackers asked Twitter users to direct bitcoins to one of three accounts, said Tom Robinson, co-founder of Elliptic, which helps law enforcemen­t agencies track bitcoin-related crime.

The attackers received just over 400 payments, according to Elliptic. The largest payment came from a Japanese exchange, and totaled about $42,000.

FOLLOW THE BITCOINS

Bitcoin offers users a degree of anonymity, making it a popular vehicle for criminal behavior. But investigat­ors can glean valuable informatio­n in cases where the cryptocurr­ency is moved to accounts, or wallets, that have carried out transactio­ns with certain U.S. exchanges or services. That’s because U.S. exchanges typically take pains to verify user identity.

“Sharing this informatio­n fast with the authoritie­s worldwide and with companies from the ecosystem, will help us stop the stolen funds and find more info about the attackers,” said Itsik Levy, co-founder of Whitestrea­m, a bitcoin researcher.

Identifyin­g potential Twitter employees to target wouldn’t be difficult for the hackers, given the way most smartphone apps vacuum up location and other contextual data from users — data which often is then sold to marketing companies. Anyone frequentin­g the same coffee shops and businesses or entering and leaving a workplace at particular hours can give away clues about themselves.

Cybersecur­ity experts can only speculate until Twitter itself reveals what happened and where the failures occurred, but even this kind of show of force — a demonstrat­ion by hackers to earn credibilit­y or gain infamy — isn’t convincing them that a bitcoin scam was all there was to the operation.

Stas Protassov, co-founder and president of global technology firm Acronis said the attack was “too prepared to be just a cryptocurr­ency scam.”

“We don’t believe that’s all the hackers went into once they got access,” he said in an email. “The attack is too big and too noisy and likely covering a bigger play. We’ve yet to see the full impact of what this was about.”

Newspapers in English

Newspapers from United States