• Latest
  • All
  • How To
Twitter

[UPDATED] Twitter Crypto Scam Hack Explained

July 17, 2020
Safaricom

Safaricom Breaks Barriers with $3B Milestone and Bold Ethiopia Play

May 9, 2025
Private Number calls

How to Handle Private Number Calls in Kenya

May 8, 2025
Kenya Power EV charging stations

Kenya Power Rolls Out 45 EV Charging Stations Across the Country

May 8, 2025
Bayobab

MTN’s Bayobab Connects Uganda and Kenya with New Fiber Route

May 8, 2025
DHgate Tablet Cases deals
Airtel Africa Starlink partnership

Starlink Is Expanding in Africa Through New Airtel Partnership

May 8, 2025
Android FreeType patch

Android May 2025 Security Update Fixes Critical FreeType Zero-Click Vulnerability

May 7, 2025
worldcoin kenya

Court Ruling Orders Worldcoin to Delete All Kenyan Biometric Records

May 7, 2025
smartphones-2024

Smartphone Market Recovers Slightly in Q1 2025 With Apple, Vivo Leading Gains

May 7, 2025
GTA 6 Trailer 2

GTA 6 Trailer 2: Rockstar Confirms Release Date and Dual Protagonists

May 7, 2025
YouTube Premium Duo

YouTube Now Lets Two People Share a Premium Plan

May 6, 2025
Infinix GT20 Pro

Infinix GT 20 Pro Review: You Don’t Need to Overspend on Gaming Power Anymore

May 6, 2025
Emerald PostPay

Safaricom Transitions Customers to New Emerald PostPay Plans

May 6, 2025
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
No Result
View All Result

[UPDATED] Twitter Crypto Scam Hack Explained

George Kamau by George Kamau
July 17, 2020
in News
Reading Time: 4 mins read
250
0
Twitter

Twitter

Last night local time, prominent and verified Twitter accounts from personal and corporate accounts started tweeting asking users to send them Bitcoin and that users would then receive twice the amount they sent.

“I’m feeling generous because of Covid-19. I’ll double any BTC payment sent to my BTC address for the next hour. Good luck, and stay safe out there!”

This was clearly a crypto scam.

WARNING: @Gemini's twitter account, along with a number of other crypto twitter accounts, has been hacked. This has resulted in @Gemini, @Coinbase, @Binance, and @Coindesk, tweeting about a scam partnership with CryptoForHealth. DO NOT CLICK THE LINK! These tweets are SCAMS.

— Tyler Winklevoss (@tyler) July 15, 2020

Also, billionaires getting philanthropic was a red flag for some people.

i knew it was a scam for sure when i saw this pic.twitter.com/JrVKHKdMQ7

— skipper jawnston (@lendamico) July 15, 2020

https://twitter.com/bry_campbell/status/1283518143227400200

hackers made a bunch of billionaires say "I'm giving back to my community" like that's not the secret phrase they'd already set up to let us know they've been kidnapped https://t.co/oCRENnkzyg

— maura quint (@behindyourback) July 15, 2020

I hope amidst all of this it doesn't get lost that the scam was to pretend that during a massive health and economic crisis the richest people on the planet said that they'd give away a few thousand dollars.

— Some More News (@SomeMoreNews) July 16, 2020

The hackers got access to accounts belonging to Bill Gates, Elon Musk, Kim Kardashian, Apple, CashApp, Kanye West, Joe Biden, Barack Obama, Uber, Warren Buffett, Jeff Bezos, Benjamin Netanyahu and Mike Bloomberg.

A load of verified(!) accounts in the world of cryptocurrency were all simultaneously hijacked to spread a scam. The idea that verifying your accounts makes it more secure.. well…

Accounts hijacked: @binance, @CoinDesk, @coinbase, @Gemini, @kucoincom and many more…

— Yonathan Klijnsma (@ydklijnsma) July 15, 2020

Users on Twitter quickly tweeted that Twitter should shut down the platform.

I don't get why they don't shut down the site right now.

— Josh Barro (@jbarro) July 15, 2020

https://twitter.com/stevekovach/status/1283513247149297675

Twitter finally tweeted a statement that they were investigating.

We are aware of a security incident impacting accounts on Twitter. We are investigating and taking steps to fix it. We will update everyone shortly.

— Support (@Support) July 15, 2020

Most users thought that the hacked accounts didn’t implement 2-factor authentication on their handles but that was not the case.

It seems like some Twitter API posting service has been compromised and being used to send out fake "giveaway" tweets from popular crypto/blockchain accounts. "CryptoForHealth" is a scam.

No way are all these accounts unprotected by strong passwords and TOTP 2FA

— Andreas (aantonop Team) (@aantonop) July 15, 2020

Terminology clarification:
The accounts are not being individually hacked as traditionally reported.

The Twitter authorization system is being hacked or employee access abused for Account Takeover.

You could argue this is semantics, but at least to me there is a difference.

— SwiftOnSecurity (@SwiftOnSecurity) July 15, 2020

Rumours started floating around

Rumors suggesting a Twitter employee with access to the user management panel was targeted. That would explain why none of the tweets appear to be coming from a 3rd party app and even affected accounts with 2FA.

— Mikael Thalen (@MikaelThalen) July 15, 2020

https://twitter.com/alexstamos/status/1283597839164047360

Twitter took a necessary step and blocked all 359,000 verified accounts from tweeting. Verified accounts had to go back to their alt accounts to tweet including media accounts that had to post updates and retweet them on their official handles.

You may be unable to Tweet or reset your password while we review and address this incident.

— Support (@Support) July 15, 2020

https://twitter.com/darth/status/1283542812496064512

A major catastrophe flared,
And Twitter was underprepared.
The verifieds fell:
We saw this as well.
Let chaos now reign, we declared.

— Limericking (@Limericking) July 16, 2020

For a while, the unverified reigned.

https://twitter.com/omosanzalette/status/1283537111640092672

To all the bluechecks watching in silent horror as we take back what is ours:

You should move to a small town, somewhere the rule of law still exists. You will not survive here.

You are not a wolf, and this is a land of wolves now

— Comfortably Smug (@ComfortablySmug) July 15, 2020

Verified accounts seeing unverified Twitter RISE pic.twitter.com/CzVzmjkctS

— Julian Gamboa (@JulianGumbo) July 15, 2020

Blue checks watching twitter right now. #Hacked pic.twitter.com/R0o00pufY4

— @FredTJoseph BURNER (@BurnerFreds) July 15, 2020

https://twitter.com/jordylancaster/status/1283526184953884673

https://twitter.com/kjhealy/status/1283530219782053889

with no blue checks, high drama on twitter will now be constrained to questionable professional advice for creatives and teens cancelling eachother over problematic ships

— 10,000 Motivated Rats (@bombsfall) July 15, 2020

DONT SILENCE ME! @Twitter pic.twitter.com/1K2Vcp3Has

— Not LIL NAS (@NasMaraj79) July 15, 2020

Well I think we all learned a valuable lesson today pic.twitter.com/58FFi2Dqcn

— Dave Itzkoff (@ditzkoff) July 15, 2020

So what did you do while the verified accounts disappeared?https://t.co/TlggPMY8hQ

— Julian Gamboa (@JulianGumbo) July 15, 2020

Twitter right now pic.twitter.com/Lc4yPxkSEc

— Hubert Vigilla (@HubertVigilla) July 15, 2020

blue checkmark accounts be like "I know a spot" and then pic.twitter.com/9ldkg7Hqvz

— Dane Arden (@DaneFarten) July 16, 2020

Later on, Twitter allowed some verified users to return back to tweeting.

https://twitter.com/Megan_Nicolett/status/1283563478297522176

the deluge of the returning blue checks is worse than predicted

— Zack Seward (@zackseward) July 16, 2020

What Exactly Happened Then?

According to Vice, multiple sources in or around the criminal world provided screenshots of an internal Twitter panel they say is linked to the account takeovers.

So Motherboard is reporting that a Twitter employee was responsible for the hacks today using a tool that allows them to take over accounts.

All it takes is one pissed off Twitter employee to cause an international incident. https://t.co/gn2TCGeBzY

— Greg Price (@greg_price11) July 16, 2020

No amount of information security will ever prevent people from being the biggest vulnerability. https://t.co/vQWrDjVAOu

— Imran Khan (@imranzomg) July 16, 2020

https://twitter.com/dancow/status/1283596293223469056

we spoke to two hackers and we were able to independently verify they were in control of hijacked accounts today. One of them said they paid the Twitter employee to help them take over accounts; not sure on the specifics here at the moment

— Jason Koebler (@jason_koebler) July 16, 2020

Twitter was then removing the images posted on its platform and suspending users who tweeted them out.

https://twitter.com/MarkDice/status/1283572367323623424

https://twitter.com/zackwhittaker/status/1283519321076097025

https://twitter.com/alexstamos/status/1283520780362321920

In all, four sources close to or inside the underground hacking community provided Motherboard with screenshots of the user tool.

Twitter confirmed this.

We know they used this access to take control of many highly-visible (including verified) accounts and Tweet on their behalf. We’re looking into what other malicious activity they may have conducted or information they may have accessed and will share more here as we have it.

— Support (@Support) July 16, 2020

would love to know more from twitter insiders how this went down.

“Social engineering” is a polite way of saying they tricked or flipped someone. https://t.co/9KAguHbApK

— rat king 🐀 (@MikeIsaac) July 16, 2020

Techcrunch reports that a hacker by the name Kirk had access to the internal panel on Twitter that let them take over control of users accounts.

“Send me @’s and BTC,” referring to Twitter usernames and cryptocurrency. “And I’ll get ur shit done.” reads several screenshots of a Discord chat shared with TechCrunch.

Tough day for us at Twitter. We all feel terrible this happened.

We’re diagnosing and will share everything we can when we have a more complete understanding of exactly what happened.

💙 to our teammates working hard to make this right.

— jack (@jack) July 16, 2020

https://twitter.com/alexstamos/status/1283624808152883200

https://twitter.com/EricaJoy/status/1283623778556116992

The severe disruption to one of the world’s largest social media platforms also highlighted its importance to everyday civic functions.

https://twitter.com/Derrick_Snyder/status/1283529433689792513

While we may think it’s funny unverified accounts were locked out, here are serious consequences here.

Twitter needs to be fully transparent with the public about what happened and what they’re doing to make sure it never happens again. https://t.co/RDszNqZWPw

— Dr. Jess Maddox (@drjessmaddox) July 15, 2020

It scary now that we know anyone can take over these prominent accounts. What happens when other malicious actors other than bitcoin scammers take over – the striking potential of Twitter to incite real-world chaos through impersonation and fraud.

pic.twitter.com/irJr3SDRAv

— no context succession (@nocontextroyco) July 16, 2020

As the Twitter accounts of prominent people/companies are hacked, let's take note of how troubling it is for a president to announce policy decisions (including military threats) on a platform susceptible to intrusions

We're one hack away from a major international incident

— Chris Lu (@ChrisLu44) July 15, 2020

If this could happen, what’s not to say someone hacks Trump’s Twitter account and declares war/says they’ve launched an attack, etc?

— Dr. Jess Maddox (@drjessmaddox) July 15, 2020

Twitter reports that the hack targetted 130 user accounts. They didn’t specify if Direct messages were compromised too.

Based on what we know right now, we believe approximately 130 accounts were targeted by the attackers in some way as part of the incident. For a small subset of these accounts, the attackers were able to gain control of the accounts and then send Tweets from those accounts.

— Support (@Support) July 17, 2020

Twitter has temporarily disabled the “Download my Data” feature for everyone.

Authorities such as the FBI and the US Senate Commerce Committee have opened an investigation into the Wednesday hack and the committee has asked Twitter to brief them next week.

The FTC is also likely to begin investigations.

This is a developing story, we’ll keep updating it with new information once it becomes available.

What they are saying:

The biggest risk is that this Twitter hack wasn’t about a bitcoin scam at all, but about something we haven’t seen yet that could be much worse. Hard to know everything the hackers did with their access but hope Twitter is able to find out definitively.

— Sarah Frier (@sarahfrier) July 16, 2020

https://twitter.com/fraying/status/1283594923757862912

What if this is a coordinated effort of some sort to either a) move some money b) discredit Twitter c) create a claim in which you can then argue that powerful people should not be on Twitter?

— Cyan Banister (@cyantist) July 16, 2020

Probably the most dangerous possible kind of social media hack, thankfully used in the dumbest way I can think of. https://t.co/jOTz4Ec7Qu

— Ben Collins (@oneunderscore__) July 16, 2020

It is WAY too early to draw this conclusion. I feel like this is just the series pilot. https://t.co/xgpUK0cLv7

— felix salmon (@felixsalmon) July 16, 2020

Wow… if this is true, then there are some serious authentication issues inside of Twitter. An internal tool like that, for a company the size of Twitter, needs to have rock-solid authentication so that anyone using it is very clearly logged and identified. https://t.co/XvT5z1kc86

— Thomas Baekdal (@baekdal) July 16, 2020

a pretty sobering thing to read given that we’ve collectively outsourced our public square to private companies built for viral advertising where security and privacy are imperfect and constantly under attack https://t.co/EMakN2I6ns

— Charlie Warzel (@cwarzel) July 16, 2020

If we’re starting a nuclear war because of tweets maybe there are bigger problems at hand https://t.co/V790bwBxuC

— Ken Wattana (@KenWattana) July 16, 2020

https://twitter.com/susanthesquark/status/1283596911119757313

https://twitter.com/vladsavov/status/1283631927610626049

This is obviously a huge embarrassment for Twitter.

But, once it's fixed, we'll all move on and keep using Twitter.

Because that's what happens w/ big tech hacks now. Accepted cost of being online.

— Axios Re:Cap (@AxiosReCap) July 15, 2020

This headline strains the definition of "hacker."

Is it hacking to pay an employee for access to a secure system?

They didn't actually break any computer security. They used money.

It's super effective. https://t.co/Qw2yi3ZsxE

— Nash, Now With Flavor Crystals (@Nash076) July 16, 2020

This website should shutdown after 8 p.m. every day, tbh.

— Kalhan (@KalhanR) July 16, 2020

https://twitter.com/Yair_Rosenberg/status/1283514603494871041

https://twitter.com/mpdillon/status/1283533700005801989

Here’s How to Protect Your Privacy and Stay Secure on Twitter

Tags: X (Twitter)
SendShare146Tweet92
George Kamau

George Kamau

I brunch on consumer tech | [email protected]

Related Posts

If You Run a Parody Account on X, These New Rules Apply Now

X Cracks Down on Misleading Fan and Parody Accounts

April 29, 2025
Titus Wekesa Sifuna

Kenyan Man Behind “I Must Go” X Account Arrested on Cybercrime Charges

April 24, 2025
bluesky

X Rival Bluesky Introduces Verification System with Blue Checkmarks

April 22, 2025
Grok 3

Grok Now Learns From Past Chats to Improve Responses

April 18, 2025
xAI to use Twitter data to train Ai

X Moves to Combat Impersonation with New Parody Account Rules

April 8, 2025
TikTok

TikTok U.S. Takeover: The Price, The Players, and The Politics

April 7, 2025

Latest

Safaricom

Safaricom Breaks Barriers with $3B Milestone and Bold Ethiopia Play

May 9, 2025
Private Number calls

How to Handle Private Number Calls in Kenya

May 8, 2025
Kenya Power EV charging stations

Kenya Power Rolls Out 45 EV Charging Stations Across the Country

May 8, 2025
Bayobab

MTN’s Bayobab Connects Uganda and Kenya with New Fiber Route

May 8, 2025
Airtel Africa Starlink partnership

Starlink Is Expanding in Africa Through New Airtel Partnership

May 8, 2025
Android FreeType patch

Android May 2025 Security Update Fixes Critical FreeType Zero-Click Vulnerability

May 7, 2025

Best devices

budget smartwatches 2025

Best Budget Smartwatches To Buy in Kenya 2025

February 13, 2025

Best Infinix Smartphones To Buy in Kenya 2024

February 13, 2025

Best Laptops for Battery Life in 2024

August 21, 2024

Best “Battery Warrior” Smartphones To Buy in 2024

August 22, 2024

Safaricom Breaks Barriers with $3B Milestone and Bold Ethiopia Play

May 9, 2025

How to Handle Private Number Calls in Kenya

May 8, 2025

Techweez is a fast growing influential source of technology news, reviews and analysis by leading tech geeks in the industry.

Follow Us

Editorials

Trump’s Tariffs Will Be the End of Affordable Tech

5 Ways to Prep Your Tech for Resale

The Weaponization of PDFs: How Cybercriminals Are Exploiting a Trusted Format

Introducing A Brainbox Quiz: Techweez’s Monthly Trivia Night!

5 Most Reliable Virtual Dollar Card Providers in Nigeria

5 Leading Grant Management Software for Nonprofits

More News

Court Ruling Orders Worldcoin to Delete All Kenyan Biometric Records

Smartphone Market Recovers Slightly in Q1 2025 With Apple, Vivo Leading Gains

GTA 6 Trailer 2: Rockstar Confirms Release Date and Dual Protagonists

YouTube Now Lets Two People Share a Premium Plan

Infinix GT 20 Pro Review: You Don’t Need to Overspend on Gaming Power Anymore

Safaricom Transitions Customers to New Emerald PostPay Plans

  • Terms Of Use
  • Techweez Brand
  • Privacy & Policy
  • Contact Us

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!

Hey there! Just a heads-up: we're big fans of cookies - both the digital and edible kind! 🍪 We use our cookies and some from third parties to ensure your browsing experience on our site is smooth sailing and secure.

 

But wait, there's more! We also use cookies to gather stats and insights on how you navigate our site. It's like getting a behind-the-scenes peek at your digital adventures!

 

Don't worry, you're in control. You can adjust your cookie settings anytime to suit your preferences. Feeling curious? Dive into our Privacy Policy for all the juicy details. Happy browsing! 🚀

Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
No Result
View All Result
  • News
  • Reviews
  • Features
  • Editorial
  • Automotive
  • Entertainment

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.