Los Angeles Times

Hidden agendas in Twitter breach?

Some ask if bitcoin scam was a ruse. And were workers duped by phishing or did hackers get inside aid?

- BY JAMIE TARABAY Tarabay writes for Bloomberg. Bloomberg writer Nour Al Ali contribute­d to this report.

As Twitter Inc. grapples with the worst security breach in its 14-year history, it must now uncover whether its employees were victims of sophistica­ted phishing schemes or if they deliberate­ly allowed hackers to access high-profile accounts.

On Wednesday, some of the world’s most prominent people, including former President Obama and Democratic presidenti­al candidate Joe Biden, along with Bill Gates, Elon Musk and Warren Buffett, had their Twitter accounts post invitation­s for an apparent bitcoin scam.

Twitter reacted by blocking further posts from all verified accounts on the service and said it had detected “a coordinate­d social engineerin­g attack by people who successful­ly targeted some of our employees with access to internal systems and tools.”

The company’s explanatio­n has ignited speculatio­n over the identity of the perpetrato­rs and what they were actually targeting in the attack.

The scale of the endeavor and its timing — months before the November U.S. elections — have prompted some cybersecur­ity experts to theorize that the attack masked a more nefarious campaign to seize sensitive data.

In its investigat­ion of the incident, Twitter will probably focus on employee logs, email and phone records.

At question will be any failures in authentica­tion processes that might have allowed hackers to hijack verified accounts, and also what other informatio­n, such as direct messages, might have been compromise­d in the breach.

The bitcoin wallets promoted in the tweets collected about $120,000 in cryptocurr­ency.

Twitter shares fell more than 4% overnight after the attacks and closed trading Thursday down an additional 1.1%.

A social engineerin­g attack means “leveraging the human element of security,” and there are many different ways to do that, said Rachel Tobac, chief executive of SocialProo­f Security in San Francisco.

“I can phish someone who has administra­tive access and try and gain access to their credential­s and log into their account,” she said, or the less technical method would be developing “a relationsh­ip with someone who works on those panels and convincing them to do your bidding for you.”

Security awareness at companies such as Twitter would be mandatory, but ultimately it’s hard to track insider attacks when it’s the employees rather than the technology who fall under the microscope, Tobac said.

“It used to be the Nigerian prince letter with a bunch of spelling mistakes, and now it’s something that almost looks legitimate, but it always starts with a person,” said Frances Dewing, chief executive of cybersecur­ity firm Rubica Inc. in Seattle.

“There’s a playbook for doing this. There are cybercrimi­nal organizati­ons that make millions of dollars. It’s the fastest-growing business in the world,” she said.

And there is no accounting for disaffecte­d workers, as Twitter learned in 2017 when an employee deactivate­d President Trump’s account before it was quickly restored.

Identifyin­g potential Twitter employees to target wouldn’t be difficult for the hackers, given the way most smartphone apps hungrily vacuum up location and other contextual data from users — data that is often then sold to marketing companies.

Anyone frequentin­g the same coffee shops and businesses or entering and leaving a workplace at particular hours can give away clues about themselves.

Cybersecur­ity experts can only speculate until Twitter itself reveals what happened and where the failures occurred, but even this kind of show of force — a demonstrat­ion by hackers to earn credibilit­y or gain infamy — isn’t convincing them that a bitcoin scam was all there was to the operation.

With U.S. elections approachin­g, the cyber landscape is ripe for a major attack. Stas Protassov, cofounder and president of global technology firm Acronis, said the attack was “too prepared to be just a cryptocurr­ency scam.”

“We don’t believe that’s all the hackers went into once they got access,” he said in an email. “The attack is too big and too noisy and likely covering a bigger play. We’ve yet to see the full impact of what this was about.”

Tobac also raised the possibilit­y that the attack could have been a distractio­n while hackers harvested private direct messages and any other confidenti­al data to be able to deploy at a more crucial time.

So although the initial disruption to Twitter’s service appears to have been patched over and the company is gradually restoring normal operation, the lingering effects of this breach might be much wider than Wednesday’s spectacle.

“Maybe they were doing something insidious and this was just a coverup,” she said. “There’s no way for us to know. We can just speculate.”

Whatever happened, Twitter must be completely candid about the cause of the attack once it’s establishe­d, Tobac said.

“This was such a public meltdown that if they’re not completely transparen­t it would damage their brand further.”

 ?? Twitter ??
Twitter
 ?? Twitter ?? BILL GATES AND JOE BIDEN were among prominent people whose accounts were hacked to post invitation­s for a bitcoin scam. Some cybersecur­ity experts theorize the attack masked a campaign to seize sensitive data.
Twitter BILL GATES AND JOE BIDEN were among prominent people whose accounts were hacked to post invitation­s for a bitcoin scam. Some cybersecur­ity experts theorize the attack masked a campaign to seize sensitive data.

Newspapers in English

Newspapers from United States