Here’s how the hackers accessed Elon Musk’s Twitter account

Remember Twitter’s epic hacking earlier this month, when other people who don’t make wells took the Twitter accounts of celebrities and business figures ranging from SpaceX CEO Elon Musk to Microsoft co-founder Bill Gates, musician Kanye West and aspiring president Joe Biden. . ?

Gradually details about how the hacking occurred have been accumulated, and now new revelations from Twitter’s own research are beginning to collect a more complete picture of one of the most important social media security breaches in history.

Twitter today admitted that hackers have earned “spear phishing” accounts to several of their workers, sending them messages, essentially, designed to trick them into extracting their login credentials.

Once the hackers had access, the company said, they accessed 130 Twitter accounts. They opened direct messages from 36 of the accounts, downloaded seven knowledge from Twitter and tweeted a Bitcoin scam for another forty-five.

There are two issues arising from twitter’s latest revelations about piracy.

The first is that a successful trick doesn’t want to be complicated; in this case, one of the most important social networking sites on Earth has been defeated because its own workers open fake links on their phones.

The time is that unknown hackers are likely to now have access to account knowledge and direct messages from dozens of high-level users, meaning it is imaginable that The personal communications of Musk, Gates or West are now floating on the web.

Musk, for his part, does not seem too involved with the leakage of his messages online.

“I’m not very involved in my DM going public,” he told the New York Times last week. “I mean, we can probably get some of my direct messages that sound bad out of context, but in general, my direct messages are more commonly about exchanging memes.”

More on Twitter hacking: someone just hacked Elon Musk, Joe Biden, Jeff Bezos and Kanye West

Leave a Comment

Your email address will not be published. Required fields are marked *