Some insights about the twitter social engineering incident. Who’s Behind Epic Twitter Hack?

Social Engineering Twitter

How do hackers break two-factor authentication and post scams on celebrity accounts? The main security flaw has been the human factor.

Some keys

How do hackers break two-factor authentication and post scams on famous accounts? The main security flaw has been the human factor.

A 17-year-old (Tampa / Florida) is at the center of Twitter’s hacking scheme. The hacking took place on July 15. At the time, Twitter said it was a “coordinated” attack targeting its employees “with access to internal tools and systems.

Clark gained access to Twitter accounts and internal controls on the social media platform by engaging a Twitter employee , sources said.

Some insights about the twitter social engineering incident. Who’s Behind Epic Twitter Hack? 3

In an update to its internal investigation, Twitter said the incident targeted employees using a phishing phone attack (Vishing) , according to a press release.

At the time of the attack, the popular social media company temporarily suspended all “verified” accounts to prevent further fraud by public figures.

Keys to the information security incident

  • Again based on human factor

  • Employee attacked through  Vishing

More information: Twitter