TechTronBlog.com

Technology, Innovation, Collaboration
Menu
  • Features
  • Gadget
  • Mobile
  • Uncategorized

Daily Tech Updates Sent to your Email

Join our Newsletter
Home
Gadget
Over 1000 Twitter staff and contractors had access to internal tools that helped hackers hijack accounts
Gadget

Over 1000 Twitter staff and contractors had access to internal tools that helped hackers hijack accounts

zadmin August 17, 2020

As Twitter and law enforcement agencies investigate the high profile attack that saw a number of public figures’ accounts hacked to spew out a cryptocurrency scam, there is a clear lesson for other businesses to learn.

As Reuters reports, as of earlier this year, in excess of 1000 Twitter staff and external contractors had access to an internal system that allows access to any account, and passwords to be reset.

It was this system that hackers abused to break into accounts belonging to the likes of presumptive US Presidential Candidate Joe Biden, former US President Barack Obama, Elon Musk, Jeff Bezos, Kanye West, and scores of others, as well as Twitter accounts owned by firms such as Apple, Coinbase, and Uber.

According to Reuters, former Twitter employees claim that “too many people”, including some at contracting firms such as Cognizant, had access to the internal tool – and even if those 1000+ people didn’t abuse it themselves, they were potentially targets for social engineering attacks by hackers eager to exploit the access.

Many system administrators responsible for securing their own companies will probably have their head in the hands seeing that figure, knowing that it’s a recipe for disaster.

But ask yourself this, what does your own company do?

Do you know how many people inside your organisation (and – gulp – external contractors) might have admin access to sensitive systems? How many workers may have been granted access to powerful tools within your company’s infrastructure which could potentially be abused?

We know many companies fail to properly off-board employees when their employment comes to an end, or if they move into a new role within the firm. It seems all too easy for many businesses to fail to go through a proper checklist revoking access to systems that are no longer required and changing passwords.

That’s one problem, of course. But another problem is giving too many people access to sensitive systems. Or not properly monitoring the access to ensure that it is not being abused, or limiting it to specific time constraints.

It’s not as though Twitter hasn’t faced these kinds of issues in the past.

Last November, for instance, a Twitter employee was charged with espionage offences after allegedly accessing the personal details of over 6,000 Twitter accounts critical of Saudi Arabia.

And in 2017, on the last day of his employment within Twitter’s customer support department, Bahtiyar Duysak deactivated Donald Trump’s account.

Giving too many people, including external staff who may be receiving lower pay, access to sensitive systems within your business poses a significant threat.

Learn from Twitter’s misfortune, police who has access to your internal network’s sensitive tools and systems, and ask yourself whether you are doing everything you can to reduce the risk.

Share
Tweet
Email
Prev Article
Next Article

Related Articles

https://www.cnet.com/news/why-the-sims-reality-show-sparkd-is-groundbreaking-for-gamers/#ftag=CAD590a51e

Why The Sims reality show Spark’d is groundbreaking for gamers – CNET

https://www.engadget.com/zte-axon-20-5g-will-have-the-first-underdisplay-camera-065530680.html

ZTE’s Axon 20 5G smartphone will have the first under-display camera

About The Author

zadmin

Leave a Reply

Cancel reply

Recent Posts

  • New tech and gadgets you absolutely can’t miss
  • Razer Pro Click ergonomic wireless mouse maximizes your productivity
  • Lume Cube Panel Mini Bicolor LED Light provides on-the-go lighting for photographers
  • LINKA LEO GPS Smart Bike Lock can track your bicycle’s movements in more than 100 countries
  • Razer Pro Glide soft mouse mat cushions your hand during use

Recent Comments

    Archives

    • August 2020

    Categories

    • Features
    • Gadget
    • Mobile
    • Uncategorized

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org

    TechTronBlog.com

    Technology, Innovation, Collaboration
    Copyright © 2021 TechTronBlog.com
    Theme by MyThemeShop.com

    Ad Blocker Detected

    Our website is made possible by displaying online advertisements to our visitors. Please consider supporting us by disabling your ad blocker.

    Refresh