Readit News logoReadit News
philip1209 · 6 years ago
I don't know how the account was compromised - but, I notice that Twitter's hardware U2F support is not designed to be very useable. They only allow one security key per account, whereas most users have multiple - one on the keychain, one left in the laptop, etc. So, I bet that high-risk accounts like Jack are not even using this enhanced security mode because of its poor user experience.

Compare this to Google where every employee is issued multiple hardware keys, internal systems require security keys, and they put a lot of effort into their "Advanced Protection Program" to make it useable: https://landing.google.com/advancedprotection/

hammock · 6 years ago
Twitter and Google are on completely different planes when it comes to what data and access they have to protect.
CobrastanJorji · 6 years ago
That's true. One is the President's principle mechanism of speaking with the American public and firing top officials.
ALittleLight · 6 years ago
Imagine if you were an intelligence agency and you were permitted to surveil American communications, and there was this pesky congressman who didn't want to support your organization, so you collect lewd photos of him from his phone and post them on his Twitter repeatedly.

You could effectively use the data on Twitter to control the leaders of the US. "Hey, remember that congressman who didn't like us and then accidentally tweeted his own sexts? That was hilarious. Anyway, we'd really like you to increase funds and be more permissive about what our agency can do."

Apropos of nothing, here's an interesting interesting website: https://votesmart.org/candidate/key-votes/23162/anthony-wein...

ceejayoz · 6 years ago
Yeah. On Twitter you can potentially impersonate the President and cause weeks/months of political chaos by calling someone the N-word or something similar.
whymauri · 6 years ago
And? If you want your company to avoid becoming a headline, you need the best security you can afford.
sdan · 6 years ago
I use U2F everywhere and can tell you that Twitter's usability with U2F is really poor. Can't remember why I stopped using U2F on twitter, but it's probably because of that fact that I couldn't use multiple keys.

Deleted Comment

xeromal · 6 years ago
Is it worth considering advanced protection as a normal person? Would it make life a pain in the butt?
rtempaccount1 · 6 years ago
I'll be interested to see the post-mortem on this breach for sure.

As an outsider, I would have thought that the Twitter security team would have a set of high-value users (with @jack being at the top of the list) who'd they keep very close tabs on in terms of any unusual activity.

Realistically Twitter is where announcements are made by world leaders and major corporations, control of these accounts could have repercussions, although in this case it just seems to have been a general hack...

harryh · 6 years ago
I don't think "keep very close tabs on" can prevent an attack on an account before it happens. All it can do is help clean up the damage quickly. Which is what happened here. The offending tweets were deleted in 10-15 minutes. That's a pretty good response time.

What could prevent an attack is limiting the features available to high-value users. One could imagine, for example, limiting 3rd party API access. Depending on what actually happened here, that might have prevented this. But there is a downside of reduced functionality for the owners of the accounts in question. There's always tradeoffs.

rtempaccount1 · 6 years ago
I'd agree that there are always trade offs however, you could do a number of things to detect an active attack, changes in user agent, location etc can be detected and flagged for review. Now that's not possible at scale, but for high value users,it would seem like a not outrageous countermeasure.
swyx · 6 years ago
they've confirmed jack's SIM was hijacked. no amount of 3rd party API stuff canhelp there
rajesh-s · 6 years ago
I believe they do keep close tabs on high profile accounts. I happened to notice it in my feed when the news hadn't broken out yet (took a couple of screenshots out of surprise too). The team quickly took all of it down as and when they were being posted. It lasted for about 10minutes or so. The hackers were adding mentions to other accounts which were immediately suspended by the folks at Twitter too.
icanhasfay · 6 years ago
I think most of the suspicions so far have been pointing to a sim swapping attack.
rtempaccount1 · 6 years ago
Hopefully if that's the case, more attention will be paid to the fact that using mobile phones for 2FA or identification on high value services is a bad idea :)
riffic · 6 years ago
>where announcements are made by world leaders and major corporations, control of these accounts could have repercussions

That control should not be solely in Twitter's hands.

Those leaders and orgs need to take a strong look at authenticity via ActivityPub self-hosted on their own namespaces.

reissbaker · 6 years ago
Self-hosting and security don't necessarily go hand-in-hand. For laypeople, self-hosting is usually worse: they don't know what threats to protect against, and even if they knew what to protect against they wouldn't know how.

And Twitter is where the audience is.

pjc50 · 6 years ago
Jack's account is self-hosted on a website he runs. It just happens to be Twitter dot com.
rtempaccount1 · 6 years ago
That's a view for sure, however it seems that some world leaders and corporations have decided that the trade offs are worth the risk...
sbassi · 6 years ago
Top of the list should be all presidents, starting with the US.
anigbrowl · 6 years ago
A better report: https://www.theverge.com/2019/8/30/20841288/jack-dorsey-ceo-...

The fact that the account was used to spread racist & nazi propaganda should be a clue; timing it for 1pm on a Friday afternoon suggests a degree of sophistication.

lonelappde · 6 years ago
Looks like big standard troll content.

1pm is sophisticated in which timezone?

anigbrowl · 6 years ago
I decided not to include links to the overt nazi/racist content.

Dead Comment

ceejayoz · 6 years ago
Why is 1pm on a Friday significant?
anigbrowl · 6 years ago
Because people in the same timezone are mostly at lunch and starting to relax for the weekend, so the potential audience is large. I wasn't thinking of anything market-related as another person suggested.
tempsy · 6 years ago
Markets close at 1pm PT/4pm ET though I wouldn’t think investors would care (and judging by lack of movement it seems to be the case)
jjoonathan · 6 years ago
1pm PT is 4pm ET, and as we know from cron, 4pm is teatime.
dang · 6 years ago
Ok, we'll change the URL to that. Thanks!
tempsy · 6 years ago
At first I thought the blame would be mostly on the cell providers but it seems Twitter deserves at least half the blame here.

I just tested the flow. If your phone is linked to your account, regardless of your 2FA settings you can just start tweeting to your account by texting to 40404 without being asked to enter a password and completely bypassing any 2FA settings on your account.

That seems highly unusual to me. Most of these attacks happen with the hacker knowing the password as well. In this case, so long as you’ve successfully ported the number you’re “in”.

exolymph · 6 years ago
Even worse than that, removing your phone number will _silently_ disable all other 2FA methods, even if you already had SMS 2FA turned off. The only way to prevent your phone number from being used in account recovery is to disable 2FA altogether, because Twitter does not allow any 2FA without a phone number attached to the account. It's appalling.
techntoke · 6 years ago
Yes, actually they do allow 2FA without a phone number attached to the account and I have set this up multiple times.
pjc50 · 6 years ago
This was the original use case of Twitter, to allow social media from dumb phones.
minimaxir · 6 years ago
It's worth noting the client is Cloudhopper: that has been compromised before.

https://twitter.com/gruber/status/859857475146854402

empyrical · 6 years ago
Here's some background on what "Cloudhopper" is:

https://twitter.com/bhaggs/status/1090016722415845376

soneca · 6 years ago
And a reply to that tweet mentions that it was used to hack other accounts before:

"I know this is an old Tweet. But are you helping out with Shrouds jacked account? Looks like whoever took over the account is using Cloudhopper to post these hateful messages on Shrouds Timeline."

kacy · 6 years ago
I wonder if Jack is a victim of a SIM port hack?
paulpauper · 6 years ago
seems like a a waste of a hack posting some messages that are quickly deleted and forgotten with no long term gain. I would have done the eth/btc giveaway scam thing and at least made good $ off it. Its like being smart in some regard, such as hacking, but dumb in others , such as maximizing the gain from the hack.
thermonot · 6 years ago
The hacker could have said he is stepping down from TWTR because of massive financial fraud, and make money by trading TWTR.
filoleg · 6 years ago
Doing so would make it really easy to trace it back to him, if he decides to make a trade big enough. The data of all trades on public markets is, after all, public.
jes · 6 years ago
Is it possible to make a substantial amount of money on such schemes while evading detection and subsequent prosecution?

https://www.marketwatch.com/story/to-catch-a-thief-how-nasda...

dictum · 6 years ago
If you want jail time, insurance fraud is probably a tad quicker.
paulpauper · 6 years ago
except that governments would quickly try to freeze the banks and stock accounts
zelly · 6 years ago
The "hacker" called AT&T and conned the call center rep into swapping Jack's SIM. It's not like they exploited a buffer overflow on Twitter's authentication service or something. They aren't smart.
CiPHPerCoder · 6 years ago
I guess this is the "in for a penny, in for a pound" school of thought?

(If you're going to be arrested for CFAA violations, might was well throw in some financial crimes too. Make sure you're unemployable for the rest of your life.)

dmix · 6 years ago
This is currently on every news channel and the content was pure trolling, no politics or agenda besides pushing some Discord channel. So seems like a win to me.
jpmattia · 6 years ago
I can only imagine the possibilities if the president's account were hacked.
daenz · 6 years ago
Fortunately the hackers always seem to speak like excited teenagers instead of impersonating the people they hack.
pat87 · 6 years ago
“speak like excited teenagers”

So does the president

pjc50 · 6 years ago
Well, he's already cheerfully posting photos of classified satellite Intel, so how bad can it be?

Dead Comment

Havoc · 6 years ago
Embarrassing but inconsequential