![twitter hacking sites that work twitter hacking sites that work](https://techcrunch.com/wp-content/uploads/2020/07/Screen-Shot-2020-07-15-at-4.18.44-PM-1.jpg)
The attack also raised questions about election security, especially since political leaders were among those attacked. The hack of high-profile accounts to share a scam showed that Twitter remained unprepared for the security threats it faces. Over the past year, in response to damaging revelations that disinformation spread widely on the service during the 2016 presidential election, Jack Dorsey, the chief executive, put a priority on promoting healthy and trustworthy tweets. The hack, and the company’s inability to quickly figure out what happened, is a major embarrassment for Twitter. It was still unclear whether private data like direct messages had been accessed. The attackers were able to send tweets from a smaller subset of accounts, the company said.
![twitter hacking sites that work twitter hacking sites that work](https://resources.infosecinstitute.com/wp-content/uploads/051415_1203_Hackingcomm2.png)
On Thursday evening, Twitter said 130 accounts had been targeted in the incident. Twitter said in a statement, “We’ve taken steps to further secure our systems and will continue to share what we learn through our investigation.” “We advise the public not to fall victim to this scam by sending cryptocurrency or money in relation to this incident.” “At this time, the accounts appear to have been compromised in order to perpetuate cryptocurrency fraud,” the agency said in a statement. The Federal Bureau of Investigation said it was looking into the hack. But another line of inquiry includes whether a Twitter employee was bribed for their credentials, something one person who claimed responsibility for the hack told the technology site Motherboard. Twitter suggested on Wednesday that the hackers had used “social engineering,” a strategy to gain passwords or other personal information by posing as a trusted person like a company representative. Investigators were still trying to determine if the hackers tricked the employee into handing over login information. Yet many of the details remained unclear, the people said. They would speak only anonymously because the investigation was still underway. Investigators know that at least one employee’s account and credentials were taken over and used to gain access to an internal dashboard, allowing the infiltrator to control most Twitter accounts, according to two people briefed on the company’s investigation. The company was also still sorting out how many accounts were affected, and whether the attackers had gained access to details within the accounts, such as private messages.Ī few things were certain. and industry titans like Elon Musk, the company’s researchers were still struggling to nail down many other basic aspects of the breach, including whether an employee had been willfully complicit. But even by Thursday afternoon, 24 hours after hackers pushed a Bitcoin scam from the accounts of political leaders like Joseph R.