• English

How did 4 teenagers penetrate Twitter and control celebrities?

The Twitter platform witnessed a major breakthrough last week that affected the accounts of many celebrities, politicians and companies, and for the damages that occurred due to this penetration, many believed that this was behind organized piracy groups sponsored by major countries.

But in a report by the American newspaper (New York Times), it became clear that those who made this uproar that shook confidence in the Twitter platform and its security measures 4 teenagers;The oldest of them does not exceed twenty years of age, so what is the story, and how these teenagers were able to penetrate Twitter, which is known to be one of the best sites that apply accurate policies regarding digital security?

How did 4 teenagers penetrate Twitter and control celebrities?

The Twitter penetration scheme started with an exciting message between two hackers late on July 14 on the Discord platform, a correspondent platform known to the pirates and players, where a user with a symbolic name (Kirk) wrote to one of his friends on the platform: “Hello my friend,I am working on Twitter, don't remember this for anyone. ”

To emphasize his seriousness, he made screenshots that prove that he can control the accounts of some celebrities on Twitter, which requires internal access to the company's computer network, but his friend who received the message of the symbolic name (LOL) thought that Kirk is joking, howeverOver the next twenty -four hours, make sure his friend is serious.

(KIRK) managed to access the most sensitive Twitter tools, which allowed it to control almost any Twitter account, including the accounts of former President Barack Obama, the American presidential candidate (Joe Biden) and the entrepreneur Ilon Musk, and many other celebrities.

The interviews and screen clips obtained by the American newspaper indicate that the attack was carried out by 4 teenagers who got to know each other because of their obsession with having the names of strange or unusual Twitter accounts, especially the accounts that consist of one letter or a number only, such as: @6 or @y.

It turned out that the called (Kirk), who created his account on the Discord platform on July 7, played a pivotal role in the attack, as he took the money from the title of Bitcoin himself and disappeared, but the identity and motivesAnother remains a mystery even for the people who worked with him.

How did 4 teenagers penetrate Twitter and control celebrities?

Where it is still unclear how much it took to the accounts he hacked to get more sensitive information, such as: private conversations, and the people who cooperated with (KIRK) mentioned to the newspaper that they only facilitated purchases and acquisition of the distinguished users names, and they withdrew as soon as it startedMore attacks continue on the famous accounts on Twitter.

Security experts said: “The hacker (LOL) and his colleague of the symbolic name (Ever so anxious) who participated in the breach of Twitter are well known on Ogusers.com, which includes people looking to buy the names of distinctive users on social media sitesOr sell it after controlling it.

Returning to the penetration of Twitter, it became clear that (Kirk) the main executor of the attack may communicate with (LOL) and (Ever so anxious) late on July 14, when they were offered to be intermediaries, in selling Twitter accounts that he controls on network sites (Deep Web where they were known, and they will take a percentage of each treatment.

In one of the first transactions, LOL (LO) was in a deal for a person who was ready to pay $ 1500 in Bitcoin, in exchange for a distinctive Twitter user name called (@Y), and the same group published an advertisement on Ogusers.com to sell the distinctive Twitter accounts for Bitcoin currency.

Later customers' flow and the prices provided to obtain account names increased, as (Kirk) showed to customers the extent of its arrival in Twitter, by its ability to change the basic security settings quickly for any user name, and send pictures of the internal control panels on Twitter as evidence that it controlled the accountsRequired.

In addition to (LOL) and (Ever so anxious) who participated (KIRK) in the midst of the sale of the accounts he dominated, it appeared that there is another famous penetration known as (Plugwalkjoe) who was a major player in the penetration of Twitter, and he contributed to the mediation to sell the names of distinguished accountsLike: (@dark), (@W) and (@50), while he personally got the username (@6).

But after 6 pm on July 15, the Twitter platform began besieging the hackers after it closed the hacked accounts and stopped reaching it, and announced in a tweet on Thursday, July 16 for the penetration, and it remained a few days later to investigate what happened.

Twitter said in a post: “The attackers targeted 130 accounts, and they managed to tweet from 45 accounts, and they downloaded eight accounts.”

She added: "We are fully aware of our responsibilities towards people who use our service and society in general, we are embarrassed, we are disappointed, and more than anything, we are sorry."

According to the talks that took place between the penetrates, it became clear that (Kirk) had achieved more than $ 180,000 from the fraud, while one of its medals achieved 20 bitcoin, and so far it has not been known about the identity of (Kirk) anything that stopped responding to its mediators and disappeared.

Category

Related Articles