Twitter was hacked on a large scale, Binance, Apple, Amazon, and the former president, poke in to see the prevention suggestions?

avatar
CertiK
4 years ago
This article is approximately 547 words,and reading the entire article takes about 1 minutes
Hackers attack Twitter on a large scale and grab BTC. Binance, Apple, Amazon, and even the former president dare to mess with it?

You give me 100 red envelopes, how about I give you 200 tomorrow.

Twitter was hacked on a large scale, Binance, Apple, Amazon, and the former president, poke in to see the prevention suggestions?Those who dare to send red envelopes are sure to receive rewards, and I am afraid that only the most trusted people. Legal programs often broadcast some similar scams to warn everyone. However, the essence of being fooled lies in these two words: trust.

image description

In order to give back to everyone (in order to support Bitcoin), I will give back to everyone now. You only need to transfer 1,000 US dollars to the following address, and I will return you 2,000 US dollars. The activity is limited to half an hour!

Twitter was hacked on a large scale, Binance, Apple, Amazon, and the former president, poke in to see the prevention suggestions?

The content of the above pictures are all screenshots from CertiK security experts

image description

Twitter was hacked on a large scale, Binance, Apple, Amazon, and the former president, poke in to see the prevention suggestions?

The content of the above pictures are all screenshots from CertiK security experts

image description

Twitter was hacked on a large scale, Binance, Apple, Amazon, and the former president, poke in to see the prevention suggestions?

The content of the above pictures are all screenshots from CertiK security experts

textTwitter was hacked on a large scale, Binance, Apple, Amazon, and the former president, poke in to see the prevention suggestions?

image description

Twitter was hacked on a large scale, Binance, Apple, Amazon, and the former president, poke in to see the prevention suggestions?

secondary title

Rumors on the Internet

1. Twitter employee accounts hacked, hackers gain admin access

The screenshots that broke out on telegram are suspected to be the background management interface of Twitter employees. Hackers can modify the user mailbox through the background management interface, and then send the link to reset the password to the mailbox controlled by themselves, so as to gain control of the target account.

 

Twitter was hacked on a large scale, Binance, Apple, Amazon, and the former president, poke in to see the prevention suggestions?

 

2. Hackers use the recently exposed vulnerabilities to attack the Twitter server and gain access to the management background

secondary title

Twitter was hacked on a large scale, Binance, Apple, Amazon, and the former president, poke in to see the prevention suggestions?

Twitter official response

At present, the reasons for the hacking of each account have not been officially disclosed. Twitter also issued an official reply at 5:45 a.m. Beijing time on the same day, saying that it will investigate the reasons as soon as possible.

Twitter was hacked on a large scale, Binance, Apple, Amazon, and the former president, poke in to see the prevention suggestions?

secondary title

 

Twitter was hacked on a large scale, Binance, Apple, Amazon, and the former president, poke in to see the prevention suggestions?

Safety Measures and Recommendations

There may be frequent incidents of one or two account thefts on social networking sites, but large-scale hacking incidents may be counted as the memorabilia of the magical year of 2020. Here the CertiK security team has compiled some measures to strengthen the security of Twitter accounts.

1. Cancel the application authorized to use your Twitter account

After logging in to Twitter, in More -> Settings and privacy -> Account -> Data and permissions -> Apps and sessions, you can see the applications currently authorized to obtain your Twitter-related permissions and the logged-in Sessions. The CertiK security team recommends regularly checking authorized Apps and removing unnecessary Apps in time. Log out suspicious Sessions.

Twitter was hacked on a large scale, Binance, Apple, Amazon, and the former president, poke in to see the prevention suggestions?

2. Enable two-factor authentication

secondary title

Twitter was hacked on a large scale, Binance, Apple, Amazon, and the former president, poke in to see the prevention suggestions?

Insufficient investment in security

Twitter has a bug bounty program on the HackerOne bug bounty platform (https://hackerone.com/twitter). Someone pointed out that Twitter only rewards $7,700 for Account takeover (account stealing) vulnerabilities, and this time hackers have stolen more than $100,000 by exploiting such vulnerabilities. Such a comparison is thought-provoking.

Twitter was hacked on a large scale, Binance, Apple, Amazon, and the former president, poke in to see the prevention suggestions?

For a company, security does not matter when it is not hacked, and it is unwilling to invest money in security. And after being hacked, the losses caused are immeasurable.

Twitter was hacked on a large scale, Binance, Apple, Amazon, and the former president, poke in to see the prevention suggestions?

Here, CertiK would like to remind everyone that even a tweet that looks very powerful may be hacked. So don’t be too convinced that a certain project is 100% safe. Once there is a 0.00000000000001% possibility of being attacked, according to Murphy’s Law, it will definitely happen. Therefore, investment in safety is essential. CertiK, as the worlds top blockchain security expert, is to help you find that 0.00000000000001% loophole and eliminate it. If your project requires,Welcome to send email to bd@certik.orgMake a consultation.

Original article, author:CertiK。Reprint/Content Collaboration/For Reporting, Please Contact report@odaily.email;Illegal reprinting must be punished by law.

ODAILY reminds readers to establish correct monetary and investment concepts, rationally view blockchain, and effectively improve risk awareness; We can actively report and report any illegal or criminal clues discovered to relevant departments.

Recommended Reading
Editor’s Picks