Twitter: Did the attackers take advantage of the home work situation?

Bitdefender_News

Share post

"Twitter hackers could have done more damage, but wanted a quick buck."

Comment from Liviu Arsene, senior digital threat analyst at Bitdefender

The spectacular attack on prominent Twitter accounts, which are very likely to be secured by two-factor authentication, can only point to a coordinated cyberattack on the employees and systems of Twitter. It can be assumed that the attackers exploited the home office context: Employees are much more likely to fall victim to fraud and spam e-mails, which then compromise devices and ultimately also company systems.

The Twitter breach could be the result of a spray-and-pray spearphishing campaign that cybercriminals successfully pulled off. And: It could be that the dubious fame for the “Hack of the Year” goes to Twitter. Because the attackers could probably have caused far greater damage. Instead, they tried to monetize the attack immediately. With the simple Bitcoin fraud, the hack should bring in money quickly - the situation is completely different with sophisticated attacks by groups that quietly pursue long-term goals with advanced persistent threats (APTs) in highly coordinated and sophisticated operations.

Liviu Arsene, Bitdefender

Liviu Arsene, Bitdefender

If these assumptions are correct, the general outlook for companies is bleak. Then it is likely that cyber criminals will damage even more companies than before by phishing inadequately protected employees. According to our surveys, half of the companies had no plan at the beginning of the pandemic to carry out the sudden migration of employees to the home office, the conversion of the infrastructures to remote work and the accompanying IT support. As a result, we are likely to see or discover more data breaches that either take advantage of employee negligence or misconfigurations of the infrastructure during the transition.

Large organizations may have strong security measures placed on the borders of their network. But it is to be feared that attackers are exploiting the weakest link in the cybersecurity chain: humans.

To Bitdefender.de  

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more