Breaking News
Home / Internet / Latest Internet News / Twitter hack may have targeted elected officials, journalists

Twitter hack may have targeted elected officials, journalists


Twitter hack

Although Twitter hasn’t revealed who may have been victimized in last week’s suspected massive account hack, an analysis suggests that accounts with high levels of influence may have been among those affected.

Within days of accusations that hackers in China were responsible for network breaches at The New York Times and The Wall Street Journal, the microblogging site revealed Friday that about 250,000 accounts might have been compromised. In e-mails to affected users, Twitter said it reset passwords for accounts it suspected of being compromised after identifying unauthorized attempts to access Twitter user data.

“This attack was not the work of amateurs, and we do not believe it was an isolated incident,” Twitter said in a company blog post Friday explaining its action. “The attackers were extremely sophisticated, and we believe other companies and organizations have also been recently similarly attacked.”

Now it appears that key media outlets, high-level elected officials, and influential journalists and tech figures may have been affected, including the Twitter account of President Obama and Vice President Joe Biden. Seventeen percent of the 100 most influential accounts in politics were possibly affected, including House Speaker John Boehner (@johnboehner), House Majority leader Eric Cantor (@EricCantor), and Republican tech strategist Patrick Ruffini (@PatrickRuffini), according to analysis by PeerReach.

Because of the hackers’ attack — which could have been intended to snare influential tech figures — 70 percent of PeerReach’s Webtech top 100 list, including @TechCrunch, Evan Williams (@ev), Tim O’Reilly (@timoreilly), Fred Wilson (@fredwilson), Om Malik (@om), and Kara Swisher (@karaswisher), were among those whose Twitter accounts had their passwords reset, the analyst reported, noting that the impacted accounts appeared to be early adopters who launched their accounts prior to 2007.

Meanwhile, 22 percent of the account linked to the analyst’s list of 100 most influential media outlets may also have been breached, according to PeerReach, including @nytimes, @reuters, @cnn, and @foxnews.

Despite the password reset, PeerReach notes that because many users recycle their credentials on a variety of sites, the hack still poses a threat:

If the hackers have 250,000 encrypted passwords in their possession they have all time of the world to break these passwords. Although the compromised accounts are forced to change their passwords, many are likely to have re-used passwords for other applications such as email, domain names and other critical services. This gives the criminals great possibilities, in combination with Social Engineering, to continue their campaign against other media sources.




  1. I am obtaining a PC and it was wondering if you will find many people who hack on games like Battleground: Bad Company 2 or any popular FPS game generally.

    Basically were playing something similar to Black Operations on PC or Bad Company 2, the number of cyber-terrorist would I encounter per day normally?

  2. So why do we want ethical cyber-terrorist? Just how can the ethical cyber-terrorist penetrate others without creating any injury to the organization?

  3. My anti-virus program has detected and blocked their attack and could obtain internet address.I wish to either eliminate that spy ware or are convinced that hacker.Does anybody understand how?i’ve premium norton anti-virus program yet it cant discover that virus or whatever.

  4. I acquired with the websense filter in school today. You realize, the one thing that keeps us from the websites we are really not ‘supposed’ to visit. Like youtube and the like. The assistant principal required me to his office and it was accusing me of ‘hacking the machine.A

    I do not think I am a hacker I’m not sure the very first factor about hacking a pc, network, or anything. All Used to do was lookup proxies, and used a Google cached page to get at youtube.

    Performs this qualify me like a ‘hacker?’

    yes yes call me dumb and all sorts of that.

    I skipped this, whether it’s relevant:

    I simply wanted to ascertain if I possibly could cope with. I wasn’t attempting to download the herpes virus to the pc or anything.

  5. Could it be true? If cyber-terrorist downloaded a Hide My IP software, like ANYKIND of Hide My IP software, does it Really HIDE the Ip you have?

    My pal was asking this, he wanted to understand.

Leave a Reply

Your email address will not be published. Required fields are marked *