{"id":5200,"date":"2020-07-18T04:08:55","date_gmt":"2020-07-18T04:08:55","guid":{"rendered":"https:\/\/aviancetechnologies.com\/blog\/blog\/hackers-tell-the-story-of-the-twitter-attack-from-the-inside\/"},"modified":"2020-07-18T07:44:13","modified_gmt":"2020-07-18T07:44:13","slug":"hackers-tell-the-story-of-the-twitter-attack-from-the-inside","status":"publish","type":"post","link":"https:\/\/aviancetechnologies.com\/blog\/hackers-tell-the-story-of-the-twitter-attack-from-the-inside\/","title":{"rendered":"Hackers Tell the Story of the Twitter Attack From the Inside"},"content":{"rendered":"<p>[responsivevoice_button rate=&#8221;1\u2033 pitch=&#8221;1.2\u2033 volume=&#8221;0.8\u2033 voice=&#8221;US English Female&#8221; buttontext=&#8221;Story in Audio&#8221;]<\/p>\n<h2>Hackers Tell the Story of the Twitter Attack From the Inside<\/h2>\n<p>&nbsp;<\/p>\n<div>\n<div class=\"css-53u6y8\">\n<p class=\"css-158dogj evys1bk0\">OAKLAND, Calif. \u2014 A Twitter hacking scheme that targeted political, corporate and cultural elites this week began with a teasing message between two hackers late Tuesday on the online messaging platform Discord.<\/p>\n<p class=\"css-158dogj evys1bk0\">\u201cyoo bro,\u201d wrote a user named \u201cKirk,\u201d according to a screenshot of the conversation shared with The New York Times. \u201ci work at twitter \/ don\u2019t show this to anyone \/ seriously.\u201d<\/p>\n<p class=\"css-158dogj evys1bk0\">He then demonstrated that he could take control of valuable Twitter accounts \u2014 the sort of thing that would require insider access to the company\u2019s computer network.<\/p>\n<p class=\"css-158dogj evys1bk0\">The hacker who received the message, using the screen name \u201clol,\u201d decided over the next 24 hours that Kirk did not actually work for Twitter because he was too willing to damage the company. But Kirk did have access to Twitter\u2019s most sensitive tools, which allowed him to take control of almost any Twitter account, including those of former President Barack Obama, Joseph R. Biden Jr., Elon Musk and many other celebrities.<\/p>\n<\/div>\n<\/div>\n<div>\n<div class=\"css-53u6y8\">\n<p class=\"css-158dogj evys1bk0\">Despite global attention on the intrusion, which has shaken confidence in Twitter and the <a class=\"css-1g7m0tk\" title=\"\" href=\"https:\/\/www.nytimes.com\/2020\/07\/16\/us\/politics\/twitter-hack.html\" target=\"_blank\" rel=\"noopener noreferrer\">security provided by other technology companies, the basic details of who were responsible, and how they did it, have been a mystery. Officials are still in the early stages of their investigation.<\/a><\/p>\n<p class=\"css-158dogj evys1bk0\">But four people who participated in the scheme spoke with The Times and shared numerous logs and screen shots of the conversations they had on Tuesday and Wednesday, demonstrating their involvement both before and after the hack became public.<\/p>\n<p class=\"css-158dogj evys1bk0\">The interviews indicate that the attack was not the work of a single country like Russia or a sophisticated group of hackers. Instead, it was done by a group of young people \u2014 one of whom says he lives at home with his mother \u2014 who got to know one another because of their obsession with owning early or unusual screen names, particularly one letter or number, like @y or @6.<\/p>\n<p class=\"css-158dogj evys1bk0\">The Times verified that the four people were connected to the hack by matching their social media and cryptocurrency accounts to accounts that were involved with the events on Wednesday. They also presented corroborating evidence of their involvement, like the logs from their conversations on Discord, a messaging platform popular with gamers and hackers, and Twitter.<\/p>\n<p class=\"css-158dogj evys1bk0\">Playing a central role in the attack was Kirk, who was taking money in and out of the same Bitcoin address as the day went on, according to an analysis of the Bitcoin transactions by The Times, with assistance from the research firm Chainalysis.<\/p>\n<\/div>\n<\/div>\n<div>\n<div class=\"css-53u6y8\">\n<p class=\"css-158dogj evys1bk0\">But the identity of Kirk, his motivation and whether he shared his access to Twitter with anyone else remain a mystery even to the people who worked with him. It is still unclear how much Kirk used his access to the accounts of people like Mr. Biden and Mr. Musk to gain more privileged information, like their private conversations on Twitter.<\/p>\n<p class=\"css-158dogj evys1bk0\">The hacker \u201clol\u201d and another one he worked with, who went by the screen name \u201cever so anxious,\u201d told The Times that they wanted to talk about their work with Kirk in order to prove that they had only facilitated the purchases and takeovers of lesser-known Twitter addresses early in the day. They said they had not continued to work with Kirk once he began more high-profile attacks around 3:30 p.m. Eastern time on Wednesday.<\/p>\n<p class=\"css-158dogj evys1bk0\">\u201cI just wanted to tell you my story because i think you might be able to clear some thing up about me and ever so anxious,\u201d \u201clol\u201d said in a chat on Discord, where he shared all the logs of his conversation with Kirk and proved his ownership of the cryptocurrency accounts he used to transact with Kirk.<\/p>\n<p class=\"css-158dogj evys1bk0\">\u201clol\u201d did not confirm his real-world identity, but said he lived on the West Coast and was in his 20s. \u201cever so anxious\u201d said he was 19 and lived in the south of England with his mother.<\/p>\n<p class=\"css-158dogj evys1bk0\">Investigators looking into the attacks said several of the details given by the hackers lined up with what they have learned so far, including Kirk\u2019s involvement both in the big hacks later in the day and the lower-profile attacks early on Wednesday.<\/p>\n<p class=\"css-158dogj evys1bk0\">The Times was initially put in touch with the hackers by a security researcher in California, Haseeb Awan, who was communicating with them because, he said, a number of them had previously targeted him and a Bitcoin-related company he once owned. They also unsuccessfully targeted his current company, <a class=\"css-1g7m0tk\" title=\"\" href=\"https:\/\/www.efani.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Efani, a secure phone provider.<\/a><\/p>\n<p class=\"css-158dogj evys1bk0\">The user known as Kirk did not have much of a reputation in hacker circles before Wednesday. His profile on Discord had been created only on July 7.<\/p>\n<\/div>\n<\/div>\n<div>\n<div class=\"css-53u6y8\">\n<p class=\"css-158dogj evys1bk0\">But \u201clol\u201d and \u201cever so anxious\u201d were well known on the website OGusers.com, where hackers have met for years to buy and sell valuable social media screen names, security experts said.<\/p>\n<p class=\"css-158dogj evys1bk0\">For online gamers, Twitter users and hackers, so-called O.G. user names \u2014 usually a short word or even a number \u2014 are hotly desired. These eye-catching handles are often snapped up by early adopters of a new online platform, the \u201coriginal gangsters\u201d of a fresh app.<\/p>\n<p class=\"css-158dogj evys1bk0\">Users who arrive on the platform later often crave the credibility of an O.G. user name, and will pay thousands of dollars to hackers who steal them from their original owners.<\/p>\n<div class=\"css-79elbk\" data-testid=\"photoviewer-wrapper\">\n<div class=\"css-1a48zt4 ehw59r15\" data-testid=\"photoviewer-children\">\n<figure class=\"css-1m53jiu e1g7ppur0\" role=\"group\" aria-label=\"media\"><figcaption class=\"css-1e7005o ewdxa0s0\"><span class=\"css-16f3y1r e13ogyst0\" aria-hidden=\"true\">A conversation between \u201cever so anxious\u201d and Kirk regarding Twitter accounts for sale. A cryptocurrency account address has been redacted from the screenshot.<\/span><\/figcaption><\/figure>\n<\/div>\n<\/div>\n<p class=\"css-158dogj evys1bk0\">Kirk connected with \u201clol\u201d late Tuesday and then \u201cever so anxious\u201d on Discord early on Wednesday, and asked if they wanted to be his middlemen, selling Twitter accounts to the online underworld where they were known. They would take a cut from each transaction.<\/p>\n<p class=\"css-158dogj evys1bk0\">In one of the first transactions, \u201clol\u201d brokered a deal for someone who was willing to pay $1,500, in Bitcoin, for the Twitter user name @y. The money went to the same Bitcoin wallet that Kirk used later in the day when he got payments from hacking the Twitter accounts of celebrities, the public ledger of Bitcoin transactions shows.<\/p>\n<p class=\"css-158dogj evys1bk0\">The group posted an ad on OGusers.com, offering Twitter handles in exchange for Bitcoin. \u201cever so anxious\u201d took the screen name @anxious, which he had long coveted. (His personalized details still sit atop the suspended account.)<\/p>\n<\/div>\n<aside class=\"css-ew4tgv\" aria-label=\"companion column\"><\/aside>\n<\/div>\n<div>\n<div class=\"css-53u6y8\">\n<p class=\"css-158dogj evys1bk0\">\u201ci just kinda found it cool having a username that other people would want,\u201d \u201cever so anxious\u201d said in a chat with The Times.<\/p>\n<p class=\"css-158dogj evys1bk0\">As the morning went on, customers poured in and the prices that Kirk demanded went up. He also demonstrated how much access he had to Twitter\u2019s systems. He was able to quickly change the most fundamental security settings on any user name and sent out pictures of Twitter\u2019s internal dashboards as proof that he had taken control of the requested accounts.<\/p>\n<p class=\"css-158dogj evys1bk0\">The group handed over @dark, @w, @l, @50 and @vague, among many others.<\/p>\n<\/div>\n<aside class=\"css-ew4tgv\" aria-label=\"companion column\"><\/aside>\n<\/div>\n<div>\n<div class=\"css-53u6y8\">\n<p class=\"css-158dogj evys1bk0\">One of their customers was another well-known figure among hackers dealing in user names \u2014 a young man known as \u201cPlugWalkJoe.\u201d On Thursday, PlugWalkJoe was the <a class=\"css-1g7m0tk\" title=\"\" href=\"https:\/\/krebsonsecurity.com\/2020\/07\/whos-behind-wednesdays-epic-twitter-hack\/\" target=\"_blank\" rel=\"noopener noreferrer\">subject of an article by the security journalist Brian Krebs, who identified the hacker as a key player in the Twitter intrusion.<\/a><\/p>\n<p class=\"css-158dogj evys1bk0\">Discord logs show that while PlugWalkJoe acquired the Twitter account @6 through \u201cever so anxious,\u201d and briefly personalized it, he was not otherwise involved in the conversation. PlugWalkJoe, who said his real name is Joseph O\u2019Connor, added in an interview with The Times that he had been getting a massage near his current home in Spain as the events occurred.<\/p>\n<p class=\"css-158dogj evys1bk0\">\u201cI don\u2019t care,\u201d said Mr. O\u2019Connor, who said he was 21 and British. \u201cThey can come arrest me. I would laugh at them. I haven\u2019t done anything.\u201d<\/p>\n<p class=\"css-158dogj evys1bk0\">Mr. O&#8217;Connor said other hackers had informed him that Kirk got access to the Twitter credentials when he found a way into Twitter\u2019s internal Slack messaging channel and saw them posted there, along with a service that gave him access to the company\u2019s servers. People investigating the case said that was consistent with what they had learned so far. A Twitter spokesman declined to comment, citing the active investigation.<\/p>\n<\/div>\n<aside class=\"css-ew4tgv\" aria-label=\"companion column\"><\/aside>\n<\/div>\n<div>\n<div class=\"css-53u6y8\">\n<p class=\"css-158dogj evys1bk0\">All of the transactions involving \u201clol\u201d and \u201cever so anxious\u201d took place before the world knew what was going on. But shortly before 3:30 p.m., tweets from the biggest cryptocurrency companies, like Coinbase, started asking for Bitcoin donations to the site cryptoforhealth.com.<\/p>\n<p class=\"css-158dogj evys1bk0\">\u201cwe just hit cb,\u201d an abbreviation for Coinbase, Kirk wrote to \u201clol\u201d on Discord a minute after taking over the company\u2019s Twitter account.<\/p>\n<p class=\"css-158dogj evys1bk0\">The public ledger of Bitcoin transactions shows that the Bitcoin wallet that paid to set up cryptoforhealth.com was the wallet that Kirk had been using all morning, according to three investigators, who said they could not speak on the record because of the open investigation.<\/p>\n<p class=\"css-158dogj evys1bk0\">In several messages on Wednesday morning, \u201cever so anxious\u201d talked about his need to get some sleep, given that it was later in the day in England. Shortly before the big hacks began, he sent a phone message to his girlfriend saying, \u201cnap time nap time,\u201d and he disappeared from the Discord logs.<\/p>\n<p class=\"css-158dogj evys1bk0\">Kirk quickly escalated his efforts, posting a message from accounts belonging to celebrities like Kanye West and tech titans like Jeff Bezos: Send Bitcoin to a specific account and your money would be sent back, doubled.<\/p>\n<p class=\"css-158dogj evys1bk0\">Shortly after 6 p.m., Twitter seemed to catch up with the attacker, and the messages stopped. But the company had to turn off access for broad swaths of users, and days later, the company was still piecing together what had happened.<\/p>\n<p class=\"css-158dogj evys1bk0\">Twitter said in a <a class=\"css-1g7m0tk\" title=\"\" href=\"https:\/\/blog.twitter.com\/en_us\/topics\/company\/2020\/an-update-on-our-security-incident.html\" target=\"_blank\" rel=\"noopener noreferrer\">blog post<\/a> that the attackers had targeted 130 accounts, gaining access and tweeting from 45 of that set. They were able to download data from eight of the accounts, the company added.<\/p>\n<\/div>\n<aside class=\"css-ew4tgv\" aria-label=\"companion column\"><\/aside>\n<\/div>\n<div>\n<div class=\"css-53u6y8\">\n<p class=\"css-158dogj evys1bk0\">\u201cWe\u2019re acutely aware of our responsibilities to the people who use our service and to society more generally,\u201d the blog post read. \u201cWe\u2019re embarrassed, we\u2019re disappointed, and more than anything, we\u2019re sorry.\u201d<\/p>\n<p class=\"css-158dogj evys1bk0\">When \u201cever so anxious\u201d woke up just after 2:30 a.m. in Britain, he looked online, saw what had happened and sent a disappointed message to his fellow middleman, \u201clol.\u201d<\/p>\n<p class=\"css-158dogj evys1bk0\">\u201ci\u2019m not sad more just annoyed. i mean he only made 20 btc,\u201d he said, referring to Kirk\u2019s Bitcoin profits from the scam, which translated to about $180,000.<\/p>\n<p class=\"css-158dogj evys1bk0\">Kirk, whoever he was, had stopped responding to his middlemen and had disappeared.<\/p>\n<\/div>\n<aside class=\"css-ew4tgv\" aria-label=\"companion column\"><\/aside>\n<\/div>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<div class=\"post-item-metadata entry-meta\">\n<p class=\"has-background has-very-light-gray-background-color\">Disclaimer: Content may be edited for style and length.\u00a0<a class=\"newsium-categories category-color-1\" href=\"https:\/\/www.nytimes.com\/2020\/07\/17\/technology\/twitter-hackers-interview.html\" target=\"_blank\" rel=\"noopener noreferrer\">Story Source<\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>[responsivevoice_button rate=&#8221;1\u2033 pitch=&#8221;1.2\u2033 volume=&#8221;0.8\u2033 voice=&#8221;US English Female&#8221; buttontext=&#8221;Story in Audio&#8221;] Hackers Tell the Story of the Twitter Attack From the Inside &nbsp; OAKLAND, Calif. \u2014 A Twitter hacking scheme that targeted political, corporate and cultural elites this week began with a teasing message between two hackers late Tuesday on the online messaging platform Discord. \u201cyoo &#8230; <a title=\"Hackers Tell the Story of the Twitter Attack From the Inside\" class=\"read-more\" href=\"https:\/\/aviancetechnologies.com\/blog\/hackers-tell-the-story-of-the-twitter-attack-from-the-inside\/\" aria-label=\"Read more about Hackers Tell the Story of the Twitter Attack From the Inside\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":5201,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1,30],"tags":[],"class_list":["post-5200","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers Tell the Story of the Twitter Attack From the Inside - Aviance Technologies<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Tell the Story of the Twitter Attack From the Inside - Aviance Technologies\" \/>\n<meta property=\"og:description\" content=\"[responsivevoice_button rate=&#8221;1\u2033 pitch=&#8221;1.2\u2033 volume=&#8221;0.8\u2033 voice=&#8221;US English Female&#8221; buttontext=&#8221;Story in Audio&#8221;] Hackers Tell the Story of the Twitter Attack From the Inside &nbsp; OAKLAND, Calif. \u2014 A Twitter hacking scheme that targeted political, corporate and cultural elites this week began with a teasing message between two hackers late Tuesday on the online messaging platform Discord. \u201cyoo ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/aviancetechnologies.com\/blog\/hackers-tell-the-story-of-the-twitter-attack-from-the-inside\/\" \/>\n<meta property=\"og:site_name\" content=\"Aviance Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-18T04:08:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-18T07:44:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2020\/07\/Hackers-Tell-the-Story-of-the-Twitter-Attack-From-the.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1050\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ATN\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ATN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/hackers-tell-the-story-of-the-twitter-attack-from-the-inside\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/hackers-tell-the-story-of-the-twitter-attack-from-the-inside\\\/\"},\"author\":{\"name\":\"ATN\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#\\\/schema\\\/person\\\/687e1451a2e1ef0b60e1759f4aeb84bc\"},\"headline\":\"Hackers Tell the Story of the Twitter Attack From the Inside\",\"datePublished\":\"2020-07-18T04:08:55+00:00\",\"dateModified\":\"2020-07-18T07:44:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/hackers-tell-the-story-of-the-twitter-attack-from-the-inside\\\/\"},\"wordCount\":1775,\"publisher\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/hackers-tell-the-story-of-the-twitter-attack-from-the-inside\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Hackers-Tell-the-Story-of-the-Twitter-Attack-From-the.jpg\",\"articleSection\":[\"NEWS\",\"TECHNOLOGY\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/hackers-tell-the-story-of-the-twitter-attack-from-the-inside\\\/\",\"url\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/hackers-tell-the-story-of-the-twitter-attack-from-the-inside\\\/\",\"name\":\"Hackers Tell the Story of the Twitter Attack From the Inside - Aviance Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/hackers-tell-the-story-of-the-twitter-attack-from-the-inside\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/hackers-tell-the-story-of-the-twitter-attack-from-the-inside\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Hackers-Tell-the-Story-of-the-Twitter-Attack-From-the.jpg\",\"datePublished\":\"2020-07-18T04:08:55+00:00\",\"dateModified\":\"2020-07-18T07:44:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/hackers-tell-the-story-of-the-twitter-attack-from-the-inside\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/hackers-tell-the-story-of-the-twitter-attack-from-the-inside\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/hackers-tell-the-story-of-the-twitter-attack-from-the-inside\\\/#primaryimage\",\"url\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Hackers-Tell-the-Story-of-the-Twitter-Attack-From-the.jpg\",\"contentUrl\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Hackers-Tell-the-Story-of-the-Twitter-Attack-From-the.jpg\",\"width\":1050,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/hackers-tell-the-story-of-the-twitter-attack-from-the-inside\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers Tell the Story of the Twitter Attack From the Inside\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/\",\"name\":\"Aviance Technologies\",\"description\":\"Latest Technology Trends\",\"publisher\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#organization\",\"name\":\"Aviance Technologies\",\"url\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/logo-aviance-tech-news.png\",\"contentUrl\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/logo-aviance-tech-news.png\",\"width\":217,\"height\":77,\"caption\":\"Aviance Technologies\"},\"image\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#\\\/schema\\\/person\\\/687e1451a2e1ef0b60e1759f4aeb84bc\",\"name\":\"ATN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f4c1ca1258ac9b116cff31ef81481958b0b795f6f4698e454fe2c71577aacc62?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f4c1ca1258ac9b116cff31ef81481958b0b795f6f4698e454fe2c71577aacc62?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f4c1ca1258ac9b116cff31ef81481958b0b795f6f4698e454fe2c71577aacc62?s=96&d=mm&r=g\",\"caption\":\"ATN\"},\"url\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/author\\\/webmaster\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers Tell the Story of the Twitter Attack From the Inside - Aviance Technologies","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Hackers Tell the Story of the Twitter Attack From the Inside - Aviance Technologies","og_description":"[responsivevoice_button rate=&#8221;1\u2033 pitch=&#8221;1.2\u2033 volume=&#8221;0.8\u2033 voice=&#8221;US English Female&#8221; buttontext=&#8221;Story in Audio&#8221;] Hackers Tell the Story of the Twitter Attack From the Inside &nbsp; OAKLAND, Calif. \u2014 A Twitter hacking scheme that targeted political, corporate and cultural elites this week began with a teasing message between two hackers late Tuesday on the online messaging platform Discord. \u201cyoo ... Read more","og_url":"https:\/\/aviancetechnologies.com\/blog\/hackers-tell-the-story-of-the-twitter-attack-from-the-inside\/","og_site_name":"Aviance Technologies","article_published_time":"2020-07-18T04:08:55+00:00","article_modified_time":"2020-07-18T07:44:13+00:00","og_image":[{"width":1050,"height":550,"url":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2020\/07\/Hackers-Tell-the-Story-of-the-Twitter-Attack-From-the.jpg","type":"image\/jpeg"}],"author":"ATN","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ATN","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/aviancetechnologies.com\/blog\/hackers-tell-the-story-of-the-twitter-attack-from-the-inside\/#article","isPartOf":{"@id":"https:\/\/aviancetechnologies.com\/blog\/hackers-tell-the-story-of-the-twitter-attack-from-the-inside\/"},"author":{"name":"ATN","@id":"https:\/\/aviancetechnologies.com\/blog\/#\/schema\/person\/687e1451a2e1ef0b60e1759f4aeb84bc"},"headline":"Hackers Tell the Story of the Twitter Attack From the Inside","datePublished":"2020-07-18T04:08:55+00:00","dateModified":"2020-07-18T07:44:13+00:00","mainEntityOfPage":{"@id":"https:\/\/aviancetechnologies.com\/blog\/hackers-tell-the-story-of-the-twitter-attack-from-the-inside\/"},"wordCount":1775,"publisher":{"@id":"https:\/\/aviancetechnologies.com\/blog\/#organization"},"image":{"@id":"https:\/\/aviancetechnologies.com\/blog\/hackers-tell-the-story-of-the-twitter-attack-from-the-inside\/#primaryimage"},"thumbnailUrl":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2020\/07\/Hackers-Tell-the-Story-of-the-Twitter-Attack-From-the.jpg","articleSection":["NEWS","TECHNOLOGY"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/aviancetechnologies.com\/blog\/hackers-tell-the-story-of-the-twitter-attack-from-the-inside\/","url":"https:\/\/aviancetechnologies.com\/blog\/hackers-tell-the-story-of-the-twitter-attack-from-the-inside\/","name":"Hackers Tell the Story of the Twitter Attack From the Inside - Aviance Technologies","isPartOf":{"@id":"https:\/\/aviancetechnologies.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/aviancetechnologies.com\/blog\/hackers-tell-the-story-of-the-twitter-attack-from-the-inside\/#primaryimage"},"image":{"@id":"https:\/\/aviancetechnologies.com\/blog\/hackers-tell-the-story-of-the-twitter-attack-from-the-inside\/#primaryimage"},"thumbnailUrl":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2020\/07\/Hackers-Tell-the-Story-of-the-Twitter-Attack-From-the.jpg","datePublished":"2020-07-18T04:08:55+00:00","dateModified":"2020-07-18T07:44:13+00:00","breadcrumb":{"@id":"https:\/\/aviancetechnologies.com\/blog\/hackers-tell-the-story-of-the-twitter-attack-from-the-inside\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/aviancetechnologies.com\/blog\/hackers-tell-the-story-of-the-twitter-attack-from-the-inside\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/aviancetechnologies.com\/blog\/hackers-tell-the-story-of-the-twitter-attack-from-the-inside\/#primaryimage","url":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2020\/07\/Hackers-Tell-the-Story-of-the-Twitter-Attack-From-the.jpg","contentUrl":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2020\/07\/Hackers-Tell-the-Story-of-the-Twitter-Attack-From-the.jpg","width":1050,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/aviancetechnologies.com\/blog\/hackers-tell-the-story-of-the-twitter-attack-from-the-inside\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/aviancetechnologies.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Hackers Tell the Story of the Twitter Attack From the Inside"}]},{"@type":"WebSite","@id":"https:\/\/aviancetechnologies.com\/blog\/#website","url":"https:\/\/aviancetechnologies.com\/blog\/","name":"Aviance Technologies","description":"Latest Technology Trends","publisher":{"@id":"https:\/\/aviancetechnologies.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/aviancetechnologies.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/aviancetechnologies.com\/blog\/#organization","name":"Aviance Technologies","url":"https:\/\/aviancetechnologies.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/aviancetechnologies.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2023\/05\/logo-aviance-tech-news.png","contentUrl":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2023\/05\/logo-aviance-tech-news.png","width":217,"height":77,"caption":"Aviance Technologies"},"image":{"@id":"https:\/\/aviancetechnologies.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/aviancetechnologies.com\/blog\/#\/schema\/person\/687e1451a2e1ef0b60e1759f4aeb84bc","name":"ATN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f4c1ca1258ac9b116cff31ef81481958b0b795f6f4698e454fe2c71577aacc62?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f4c1ca1258ac9b116cff31ef81481958b0b795f6f4698e454fe2c71577aacc62?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f4c1ca1258ac9b116cff31ef81481958b0b795f6f4698e454fe2c71577aacc62?s=96&d=mm&r=g","caption":"ATN"},"url":"https:\/\/aviancetechnologies.com\/blog\/author\/webmaster\/"}]}},"_links":{"self":[{"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/posts\/5200","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/comments?post=5200"}],"version-history":[{"count":0,"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/posts\/5200\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/media\/5201"}],"wp:attachment":[{"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/media?parent=5200"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/categories?post=5200"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/tags?post=5200"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}