Category Archives: Twitter

Twitter is the second most well-known and most used social network. It's hacked all the time. Hackers use complex tricks to hack this social network.

Canadian Foundation's Twitter account attacked

The Canadian Epilepsy Foundation has been the target of an unknown hacker's computer attack, specifically its Twitter account.

To this end, it has filed a complaint against "an unidentified group for a coordinated attack on its Twitter feed. ». According to the foundation's statements, unidentified users made publications that could cause seizures in others who followed the foundation's account if they had a form of photosensitive epilepsy. The computer attack took place obviously last November, in the middle of a national campaign to fight and raise awareness of epilepsy. The perpetrators then took advantage of this moment to carry out their misdeeds "when the greatest number of people with epilepsy and epileptic seizures were likely to follow our publications," the foundation said.

He had more than 30 accounts that were involved in this rather inappropriate act. "This attack is similar to that of a person carrying a lamp strobe at a conference of people with epilepsy. The intention perpetrators is to cause crises and thus cause harm to the important to the participants," said Epilepsy Foundation's Director of Legal Representation, Allison Nichol. She later added: "The fact that these attacks took place during the month of the national epilepsy awareness campaign point out that they are reprehensible." In addition, "The Foundation cooperates fully with law enforcement and intends to use all the means available to ensure that those responsible are held accountable fully responsible. »

According to the Canadian Foundation, this combined attack that was directed against his account Twitter is quite similar to the one that targeted author and journalist Kurt Mr. Eichenwald. Indeed, in retaliation, in exactly 2016, he received a Tweet from a unknown user, with an animated strobe light. This tweet followed message that said: "Your publications deserve a crisis epilepsy." The consequences were, of course, obvious given that the journalist did have an epileptic seizure that put him in bed for several years days. By the force of things, the individual responsible for this wrongdoing was later apprehended by the police. His case is being tried. Looks like he'll plead guilty.

It's no doubt for this reason that the Canadian Foundation and several other organizations in battle and for years for social networks to such as Facebook and Twitter can turn off auto-playing GIF messages or other video posts.

So far, there has been no reaction from the social network. The investigation is ongoing and so far the perpetrators have not yet been identified. Which will obviously be soon. Would the request of the Foundation and other groups be legitimate then?

Now access an unlimited number of passwords:

Check out our hacking software



Twitter delivers its users' phone numbers to advertisers

We have always believed and of course we continue to believe that the dual authentication system is safer for the security of our data and also for the protection of our online accounts.

After what has happened we realize that two-factor authentication is not as good a thing as we thought. It will jeopardize our privacy and our ability to choose freely on the Internet.

This article will also interest you: The CEO of Twitter and his hacked account. What is the substance of the story?

Recently it was communicated by TechRadar precisely on October 9, 2019 that the social network Twitter had authorized access to advertisers to use phone numbers of its users. In addition to a telephone number, it could be that the social network also allowed these same advertisers to recover the registered email addresses.

As if to apologize or defend itself, Twitter claimed that this was due to a "recently discovered" security flaw, which concerned its method of protecting the personal data of users who activated dual authentication. As we know, this last process doubles its security of access by sending code to the address by the user. This second code comes after the use of the first passcode. This of course makes it difficult to hack accounts from a foreign terminal.

It is known that this feature has existed since 2017 on Twitter, and apparently everyone who has provided their phone number to take advantage of this protection will be affected by this likely security flaw. And we know that the social network also often uses this identification process to ensure that the account is not managed by a robot. Clearly it was a method that benefits both sides. So far, of course. Unfortunately, "This data may have been inadvertently used for advertising purposes," the social network finally acknowledged in a statement. Apparently, this flaw was used to create several advertising programs for Twitter's partners and also to set up new targeted audiences.

Security flaw or deliberate action?

For many observers, the social network would have voluntary procured to its advertisers a list not to say lists containing marketing data essentially from phone number and email address. «  We're really sorry that it happened, and we're taking measures to ensure that such an error is not repeated (…) we we do not know exactly how many people are affected (…) In an effort to be transparent, we want everyone to know ».

Twitter nevertheless wanted to confirm that no users' personal data has only been shared to third parties. That any use that has been made with personal information that has leaked, has only been used for activities organized on its platform.

However, this is a real violation of users' privacy. This kind of misdirecting is not an isolated fact. This is becoming practically a habit among the digital giants. One wonders what punishment Twitter will be sentenced to because such levity should not go unpunished.

Now access an unlimited number of passwords:

Check out our hacking software



The CEO of Twitter and his account hacked. What is the substance of the story?

On August 30, 2019, i.e. only a week of that, Jack Dorsey, the boss of one of the world's largest digital platforms, was the victim of a cyberattack. Its subscribers, which number about 4 million, have had the unpleasant surprise of seeing racist and unpleasant posts on the CEO's wall.

You may also be interested in this article: How to hack into a Twitter account?

hacking was for a short time, it was not none less than it was quite extraordinary. those 15 minutes sufficiently allowed the culprit to mess up a little bit in the sphere of Twitter boss. Jack Dorsey, for his part, had the reflex to react very quickly. He immediately took back control of his account. He began to to hunt down the culprit or the culprits.

However, this little hacking is a straw in Twitter boss's eye. Indeed, he is one of the people as the most thorough in cybersecurity practices. without Forget that it is supervised by a fairly specialized team.

What didn't work or what went wrong actually passed?

The revelation was made to us just a little more late. The technique used by the culprits is called the "SIM Swapping. It's the technique that has managed to overcome the entire security arsenal Jack Dorsey. But what exactly is SIM swapping?

It's a fairly simple technique that doesn't require not necessarily technical skills. And it's a vicious technique Let's note it. It involves taking someone's phone number and transfer it to another SIM card. Indeed, the telephone numbers are usually associated with a SIM card. The pirate's technique will consist of contact the victim's mobile operator by impersoning her. under pretext of a malfunction or even the loss of a mobile phone, it will ask the operator to transfer the phone number to another card SIM that he will have in his possession. But to succeed this coup, the pirate knows certain details about his victim such as names and surnames, address, date of birth… information that is now very easy to find on the internet or still anywhere. Once the number is transfer to the SIM card the hacker wants, the hacker can then access text messages and calls that are originally intended for his victim. As a result, it can thus gather information about the latter which could be fatal.

However, in the case of the CEO of Twitter, pirates used a fairly simple flying technique. Indeed, they are used as a technique that allows them to send a tweet via SMS while simply. This service does exist and is most often intended for some people who do not have a smartphone in their room areas with a weak network. This service is called "Cloudhopper." the hackers having the jack Dorsey phone number they just used system as it is designed to publish inappropriate messages on the profile of the latter.

The culprit is a group of hackers "Chuckling Squad." They are not at their first account hack celebrities.

The new technique we just talked about is "SIM swapping" is a dangerous technique so it is difficult to prevent it. Often it can have financial consequences. Earlier this year, an American man was arrested for using technology to steal millions of dollars from his victims. At the moment the technique is not widespread, a good thing for the majority of Internet users who tend to associate the phone number with their online accounts. However, there is only one thing that protects against this kind of piracy. Dual-factor authentication. But this time, the second stage of confirmation must be done via a physical security TV.

Now access an unlimited number of passwords:

Check out our hacking software

Use Twitter to send money

S-money, you know? I'm not sure. S-money is a device for transferring money and paying via your smartphone. Developed by the BPCE Group since 2011, this mobile application is not limited to the payment of small sums at its merchant. In its pro version, it also presents itself as a payment platform, valid as much for remote payment, crowdfunding, as proximity payment.

It is therefore a mobile application, completely free and facilitating digital transactions. But since the beginning of 2015, S-money, usable regardless of your bank, has been linked to Twitter. It is now possible to send money to someone through a simple Tweet…

All you have to do is type the hashtag @SmoneyFR, followed by the send (sum) and finish with your correspondent's Twitter address. Simple, practical, efficient, and apparently well secure. And in the end, money becomes a text like any other…

A new way of doing things

If the process has enough to seduce a whole game (geek?) people, it raises questions about the true value of money. While we are told for a long time that we have to work for hours in psychological conditions sometimes very precarious, to be able to claim a salary of misery, everything is done, on the other hand, to show us that money is only a virtual game that we can address to each other as if we were sending each other a selfie the day after cooking.

Philosophically, that's a problem. Because the digitization of money, and thus the virtualization of it, tends to show every day that money no longer has value in itself. The examples are daily and very numerous. The first of these comes from your bank and the money creation process. In fact, money is created by debt. Every time you borrow from your bank, your bank creates the money. It does not borrow it elsewhere, contrary to what can be heard here and there. And, when you repay, the bank cancels the capital created, and retains the interest, which happens to be the new currency.

Valuation based on indices

Without going into the details of market games, debts (non-existent virtual money) are valued according to indices, and allow the creation of money, or at least values associated with everyday consumer goods and raw materials, such as oil, rice or wheat. So much so that it no longer makes sense.

But until now, this monetary dematerialization has only affected the markets. From now on, we will have to deal with it also in our daily lives. And all the more so since all governments in the Western world are gradually opting for a reduction in the possibilities of withdrawal and cash payments. Indeed, payment ceilings are steadily lowering, under the guise of combating tax evasion, parallel markets (understand, uncontrolled markets) and black work.

Welcome to a world where even money is no longer valuable…

In all this novelty, there is still a major gap that is that of the fraudulent use of a Twitter account.

Now access an unlimited number of passwords:
Download for free

Image source: Flickr

Related: Securing your Twitter account in a few steps