Page 29 - bon-dia-aruba-20200718
P. 29

A29
                                                                                            TECHNOLOGY Saturday 18 July 2020
            Experts say Twitter breach troubling, undermines trust




            By ZEN SOO                                                                                                          materialized,  Wyden  said
            AP Technology Writer                                                                                                Thursday,  leaving  every-
            HONG  KONG  (AP)  —  A                                                                                              one's  private  messages
            breach  in  Twitter's  secu-                                                                                        "vulnerable  to  employees
            rity  that  allowed  hackers                                                                                        who  abuse  their  internal
            to break into the accounts                                                                                          access  to  the  company's
            of leaders and technology                                                                                           systems,  and  hackers  who
            moguls  is  one  of  the  worst                                                                                     gain unauthorized access."
            attacks in recent years and                                                                                         "This  is  a  vulnerability  that
            may  shake  trust  in  a  plat-                                                                                     has lasted for far too long,
            form  politicians  and  CEOs                                                                                        and one that is not present
            use  to  communicate  with                                                                                          in  other,  competing  plat-
            the  public,  experts  said                                                                                         forms,"  Wyden  said  in  an
            Thursday.                                                                                                           emailed statement.
            The  FBI  said  Thursday  it  is                                                                                    "If  hackers  gained  access
            investigating  the  hacks,                                                                                          to  users'  DMs,  this  breach
            and  said  the  high-profile                                                                                        could  have  a  breathtak-
            accounts "appear to have                                                                                            ing  impact,  for  years  to
            been  compromised  in  or-                                                                                          come."q
            der  to  perpetuate  crypto-
            currency fraud."
            The     ruse    discovered
            Wednesday  included  bo-
            gus  tweets  from  former
            President  Barack  Obama,    This April 3, 2013, file photo shows bitcoin tokens in Sandy, Utah.
            Democratic      presidential                                                                       Associated Press
            front-runner   Joe   Biden,
            Mike  Bloomberg  and  a  ing  director  of  cybersecu-    were  tricked,  that's  actu-  er  activities  and  reducing
            number of tech billionaires  rity firm Network Box.       ally  a  serious  cybersecu-  the number of people who
            including  Amazon  CEO  Reacting  to  the  breach,  rity  problem  in  itself,"  he  have  access  to  sensitive
            Jeff  Bezos,  Microsoft  co-  Twitter  swiftly  deleted  the  said. "How can one of the  data, Tobac said.
            founder Bill Gates and Tesla  tweets  and  locked  down  world's  most  used  social  This week's case follows last
            CEO Elon Musk. Celebrities  the  accounts  to  investi-   media platforms have such  year's  federal  investigation
            Kanye  West  and  his  wife,  gate. In the process it pre-  weak  security,  from  a  hu-  of  two  former  Twitter  em-
            Kim Kardashian West, were  vented  verified  users  from  man perspective?"            ployees charged with spy-
            also hacked.                 sending out tweets for sev-  Rachel  Tobac,  CEO  of  So-  ing  on  users  for  the  Saudi
            Twitter  said  the  hackers  eral hours.                  cialproof Security, said that  government.
            used  "social  engineering"  The  company  said  Thurs-   the  breach  appeared  to  Several     U.S.   lawmakers
            to target some of the com-   day it has taken "significant  be largely  financially  moti-  called  on  Twitter  to  coop-
            pany's   employees     and  steps  to  limit  access  to  in-  vated.  But  such  an  attack  erate  with  authorities  in-
            then gained access to the  ternal  systems  and  tools."  could  cause  more  serious  cluding the Department of
            accounts.  The  term  refers  User passwords did not ap-  consequences.                Justice  and  the  FBI  to  se-
            to taking advantage of hu-   pear  to  have  been  com-   "Can  you  imagine  if  they  cure the site after the latest
            man nature via phishing at-  promised,  Twitter  said,  so  had  taken  over  a  world  breach.
            tacks,  tricking  people  into  it's  not  necessary  for  users  leader's   account,   and  "I  am  concerned  that  this
            downloading       malicious  to reset them.               tweeted out a threat of vio-  event  may  represent  not
            software  or  compromising  Many     celebrities,   politi-  lence  to  another  country's  merely  a  coordinated  set
            them by offering something  cians  and  business  lead-   leader?"  asked  Tobac,  a  of  separate  hacking  inci-
            in  return  for  information.  ers  often  use  Twitter  as  a  social  engineering  hacker  dents but rather a success-
            Twitter  did  not  say  how  its  public  platform  to  make  who  specializes  in  provid-  ful attack on the security of
            employees  were  compro-     statements.  U.S.  President  ing  training  for  companies  Twitter itself," said Sen. Josh
            mised.                       Donald  Trump,  for  exam-   to protect themselves from  Hawley, a Missouri Republi-
            The  attackers  sent  out  ple,  regularly  uses  Twitter  such breaches.              can.
            tweets  from  the  accounts  to post about national and  Tobac said companies can  He  added  that  millions  of
            of the public figures, offer-  geopolitical  matters,  and  guard  themselves  against  users  relied  on  Twitter  not
            ing to send $2,000 for every  his  account  is  closely  fol-  such  attacks  by  beefing  just to send tweets but also
            $1,000  sent  to  an  anony-  lowed  by  media,  analysts  up multi-factor authentica-  communicate privately via
            mous Bitcoin address.        and  governments  around  tion -– where users have to  direct  messaging.  Twitter
            Cybersecurity  experts  say  the world.                   present  multiple  pieces  of  hasn't said if hackers were
            such a breach could have  The White House said Thurs-     evidence  as  authentica-    able to access the private
            dire  consequences  since  day his account was secure  tion  before  being  allowed  messages of their high-pro-
            the  attackers  were  tweet-  and wasn't jeopardized by  to log into a system.         file targets.
            ing  from  verified,  globally  the hacks.                Such  a  process  could  in-  Oregon  Democratic  Sen.
            influential  accounts  with  Twitter faces an uphill bat-  clude having a physical to-  Ron  Wyden  said  Twitter
            millions of followers.       tle  in  regaining  people's  ken that an employee must  CEO  Jack  Dorsey  told  him
            "If you receive a tweet from  confidence,  Gazeley  said.  have with them, on top of  in  a  private  conversation
            a verified account, belong-  For  a  start,  it  needs  to  fig-  a  password,  before  they  in  2018  that  the  company
            ing  to  a  well-known  and  ure  out  exactly  which  ac-  can log into a corporate or  was working on protecting
            therefore  trusted  person,  counts  were  hacked  and  other private system.          direct messages, known as
            you can no longer assume  show       the   vulnerabilities  Other  methods  include  in-  DMs,  with  end-to-end  en-
            it's  really  from  them,"  said  have been fixed, he said.  stalling  technical  tools  to  cryption.
            Michael  Gazeley,  manag-    "If key employees at Twitter  monitor for suspicious insid-  But  that  promise  never
   24   25   26   27   28   29   30   31   32