DTX Manchester DTX Manchester
  • About Us
Sunday, 28 February, 2021
IT Security Guru
CTX Manchester 2020 banner ad
  • Home
  • Features
  • Insight
  • Events
    • Women in Cyber 2020
    • Women in Cyber 2020 [SPONSORS]
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Women in Cyber 2020
    • Women in Cyber 2020 [SPONSORS]
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

India’s Prime Minister Narendra Modi Twitter Account hacked

Twitter reports that the Prime Minister's personal website's account was hacked

by Jade
September 4, 2020
in Cyber Bites
Twitter home screen
Share on FacebookShare on Twitter

Followers were asked through a number of tweets to donate cryptocurrency to a relief fund supposedly set up by Modi’s office.

Twitter reported being aware of such activity and set about putting precautions in place in order to secure the account.

This is the most recent high-profile Twitter breach following similar attacks in July targeting Joe Biden, US presidential candidate, and Tesla’s Elon Musk.

The account is Prime Minister Modi’s official Twitter handle which boasts 2.5m followers.

“While this does match a similar pattern from the last round of hacks asking for cryptocurrency, this appears to be an isolate incident and to an account with far fewer followers than PM Modi’s personal account,” explained Chad Anderson, senior security researcher at DomainTools. “As Twitter has higher security for certain accounts of leaders, celebrities, and higher follower count I would assume that this was a simple password reset attack or other targeted attack against the compromised account.”

The following cybersecurity experts have had their say:

Javvad Malik, security awareness advocate at KnowBe4:

“Social media accounts, particularly those with large influence, are among the most valuable digital assets around. If criminals gain access to them, they can not only perpetrate fraud, such as asking unsuspecting followers to pay cryptocurrency under false pretences – but they can spread disinformation, lies, or social engineer others via private messages. 

It’s therefore vitally important that organisations, vendors, and users, take all steps necessary to protect their social media accounts. For users, this includes, but is not limited to ensuring passwords are strong and not reused and enabling MFA where it is available. Additionally, users of social media accounts should be wary of links sent to them, or messages which are unexpected or appear out of the ordinary. Remaining vigilant online at all times is essential to help prevent being a victim of online scams, fraud, and even corporate espionage.”

Hank Schless, senior manager for security solutions at mobile security specialists Lookout:

“It’s critical to train your employees on how to spot mobile phishing attempts. Your employees are the first line of defense against a phishing-related breach. Most people understand how to spot phishing attempts sent to a computer via email, but that all goes out the window on mobile devices. This attack is an example of Account Takeover (ATO), which is a common tactic malicious actors use to gain access to personal and corporate accounts.” 

0 0 vote
Article Rating
FacebookTweetLinkedIn
Share1TweetShare
Previous Post

How to avoid personal and corporate account takeovers

Next Post

Hackers fly under the FBI’s radar in 2016 election – will it happen again?

Subscribe
Notify of
guest
guest
0 Comments
Inline Feedbacks
View all comments

Recent News

Npower shuts down app after hackers steal customer bank info  

February 26, 2021
Partnership announcement: Edgescan partners with BSI to deliver safe and secure client solutions

Edgescan partners with BSI to deliver safe and secure client solutions

February 26, 2021
Microsoft building

Microsoft failed to fix known problems that could have prevented SolarWinds hack

February 26, 2021
Microscope

Dutch Research Council experience ransomware attack

February 26, 2021

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Women in Cyber 2020
    • Women in Cyber 2020 [SPONSORS]
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

More information
wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply
Privacy Settings / PENDINGGDPR Compliance

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Accept