articles
Some insights about the twitter social engineering incident. Who’s Behind Epic Twitter Hack?

Some insights about the twitter social engineering incident. Who’s Behind Epic Twitter Hack?

by
Kymatio
|

How do hackers break two-factor authentication and post scams on celebrity accounts? The main security flaw has been the human factor.

IN THIS article

How Hackers Bypassed 2FA and Took Over Celebrity Twitter Accounts

On July 15, a significant security breach hit Twitter, leading to scams posted from high-profile accounts. The incident highlighted a critical reality: even robust technical measures like two-factor authentication (2FA) can be bypassed when the human factor is exploited.

The Incident

  • Perpetrator: A 17-year-old from Tampa, Florida.
  • Method: Vishing (voice phishing) attack on a Twitter employee.
  • Target: Internal tools and systems with control over accounts.
  • Outcome: Direct access to celebrity accounts and the ability to post fraudulent content.

How the Attack Worked

  1. Phishing by phone (Vishing) The attacker contacted a Twitter employee by phone, impersonating a trusted party. Using social engineering, the attacker persuaded the employee to provide sensitive credentials or grant access to internal systems.
  2. Bypassing 2FA While 2FA protects against password theft, if attackers compromise internal administrator tools, they can bypass this protection entirely.
  3. Control and Exploitation With privileged access, the attacker reset account credentials, logged in, and published cryptocurrency scams from verified accounts.

Security Lessons

  • Two-factor authentication is not sufficient if insider systems are compromised.
  • Employee awareness and training are essential, as technical measures cannot fully compensate for human vulnerabilities.
  • Vishing and other social engineering tactics require specific prevention programs.

How to Reduce the Risk

  • Provide training to detect and respond to vishing attempts.
  • Require multi-person approval for sensitive internal actions.
  • Restrict privileged access to essential personnel only.
  • Monitor and flag unusual use of administrator tools.