Anatomy of a Breach

Anatomy of a Breach: Twitter — When Barack Obama, Elon Musk, and Apple Tweeted a Bitcoin Scam

> series: anatomy_of_a_breach —— part: 139 —— target: twitter —— accounts: obama_biden_musk_gates_apple —— method: phone_social_engineering<span class="cursor-blink">_</span>_

Hedgehog Security 31 July 2020 13 min read

Obama. Biden. Musk. Gates. Apple. All tweeted a Bitcoin scam. A 17-year-old did it by phone.

On 15 July 2020, the Twitter accounts of Barack Obama, Joe Biden, Elon Musk, Bill Gates, Jeff Bezos, Apple, Uber, and approximately 120 other high-profile accounts simultaneously posted messages promoting a Bitcoin scam — promising to double any Bitcoin sent to a specified wallet address. The tweets, coming from the most followed and trusted accounts on the platform, were seen by millions before Twitter suspended posting for all verified accounts and began removing the fraudulent messages.

The attack was achieved not through a software vulnerability but through phone-based social engineering: the attackers — led by a 17-year-old from Florida — phoned Twitter employees, impersonated internal IT staff, and persuaded the employees to provide their credentials. The stolen credentials gave the attackers access to Twitter's internal administrative tools, which allowed them to reset email addresses on any account, bypass MFA, and take direct control. The scam netted approximately $120,000 in Bitcoin — a modest sum given the access level achieved. Had the attackers sought to manipulate markets, spread disinformation, or impersonate political leaders during a crisis, the consequences could have been catastrophic.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

No zero-day. No exploit. A phone call.

Vishing (Voice Phishing) — The Overlooked Threat
The attackers used phone-based social engineering — vishing — rather than email phishing. This is a growing threat vector that many organisations do not test for. Our <a href="/penetration-testing/social-engineering">social engineering assessments</a> include vishing scenarios — testing whether staff will provide credentials or access over the phone to convincing imposters.
Internal Admin Tools: Unlimited Power
Twitter's internal tools allowed employees to take over any account — a 'god mode' capability that, when compromised, gave the attackers unlimited access. Internal tools with elevated privileges must be protected with MFA, access logging, and anomaly detection. Our <a href="/penetration-testing/infrastructure">internal penetration testing</a> assesses administrative tool security.
A 17-Year-Old
The ringleader was 17 years old — demonstrating, as with <a href="/blog/anatomy-of-a-breach-talktalk">TalkTalk's 15-year-old attacker</a> (2015), that sophisticated-seeming attacks often require only social skills, not technical expertise. The barrier to entry for social engineering is effectively zero.
What If It Wasn't a Bitcoin Scam?
The attackers used their access for a $120K Bitcoin scam. Had they instead posted false statements from world leaders — market-moving announcements, geopolitical provocations, or election disinformation — the consequences could have been catastrophic. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors for the anomalous account activity that indicates social media account compromise.

Test your people. They are the security control that matters most.

The Twitter hack proved that the most sophisticated technology platform in the world can be compromised by a teenager with a phone — if the human element is not tested and hardened. For every UK organisation, the lesson is: test your people as rigorously as you test your technology. Social engineering assessments — including vishing, phishing, and physical social engineering — test the human security controls that technology cannot replace.

Cyber Essentials mandates MFA on administrative accounts. Our social engineering testing assesses staff resilience to phone-based and email-based attacks. SOC in a Box monitors for the anomalous internal tool access that indicates compromised credentials. And UK Cyber Defence provides incident response when social engineering attacks succeed.


A phone call took over Obama's Twitter. Would your staff give their credentials to a convincing caller?

Our <a href="/penetration-testing/social-engineering">social engineering assessments</a> test vishing, phishing, and physical access. <a href="/cyber-essentials">Cyber Essentials</a> mandates MFA. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors admin tool access.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles