Credential theft
Twitter 2020 Bitcoin Scam: Social Engineering of Admin Tools (130 High-Profile Accounts)
Primary Source βIncident Details
On July 15, 2020, attackers hijacked approximately 130 high-profile Twitter accounts including Barack Obama, Joe Biden, Elon Musk, Bill Gates, Apple, Uber, Jeff Bezos, Kanye West, Mike Bloomberg, and others to post Bitcoin scam messages. The attackers used vishing (phone-based social engineering) to impersonate Twitter’s IT department and trick Twitter employees β who were working from home due to COVID-19 β into providing their credentials to a fake corporate VPN portal. With these credentials, they accessed Twitter’s internal ‘admin panel’ and gained the ability to take over any account. The scam Bitcoin wallets received approximately $120,000 before Twitter suspended the accounts. The attackers also accessed the DMs of 36 high-profile accounts and downloaded the full data archives of 8 non-verified accounts. Twitter was forced to temporarily disable the ability for verified accounts to tweet. The FBI arrested the three perpetrators: Graham Ivan Clark, 17, of Tampa (the alleged ringleader); Mason Sheppard, 19, of UK; and Nima Fazeli, 22, of Orlando. Clark was sentenced to 3 years in a juvenile facility. The attack demonstrated that even the most sophisticated platform security could be undermined by basic social engineering of employees β and that COVID-era remote work created new social engineering opportunities.
Technical Details
- Initial Attack Vector
- Vishing (voice phishing) calls targeting Twitter employees not in the office due to COVID-19; attackers impersonated Twitter IT staff to trick employees into providing credentials to a fake VPN portal, then used those credentials to access Twitter's internal admin tools
- Vendor / Product
- Twitter internal admin tools ('God Mode')
Timeline
- 2020-07-15 Breach occurred
- 2020-07-15 Publicly disclosed
- 2020-07-15 Customers notified