- The official Twitter account of Twitter founder and CEO Jack Dorsey was hacked after a number of other weird incidents involving YouTube celebrities and influencers.
- Hackers apparently used a tactic known as SIM swapping or SIM hacking: hackers can post tweets to the victim's profile using Twitter's Twitter service after tricking the phone service provider into porting the numbers to The victim's cellphone is a hacker-owned phone.
- Mobile phone users can protect themselves against such an attack by assigning PINs to their accounts or using a third-party, two-factor authentication system, according to Wired.
- Visit the Business Insider homepage for more stories.
Twitter founder and CEO Jack Dorsey was hacked on August 30, shocking his followers as his account broadcast racial slaves, anti-Semitic tweets and more offensive content before all tweets and retweets were eventually removed. .
According to an initial statement in Twitter "security surveillance" by the provider left the hackers in control. The Twitter communications team delayed r making it clear that "the phone number associated with the account has been compromised due to security surveillance of by the mobile provider ."
The hack seems to be from the same group that attacks a number of accounts, belonging to YouTube Celebrities on Twitter last week, including beauty vlogger James Charles, Shane Dawson and King Bach.
Daniel Keemstar, Kim, who has been hacking several times, tweeted that the telephone service provider was at fault and claimed that the company had inadvertently allowed the hackers to call and request a SIM change. the high profile account name card.
Read More : James Charles is the latest YouTuber to be hacked on Twitter by the same group or person who goes through a "Twitter"
The tactic is in line with Twitter's explanation of the Dorsey hack, which the company said was caused by hackers using a phone number to send tweets via text message.
Such tactics are often known as "SIM hacking". This happens when a hacker scams a mobile carrier to transfer the victim's cellphone number to a new phone – one owned by the hacker. The hackers can then use the Twitter text-to-tweet service to post tweets to the victim's account.
Wired reports that smartphone users can protect themselves against SIM swapping by adding a password to their carrier account or using a third-party application – such as Google Authenticator and Authy – for two-factor authentication.