Twitter security in crosshairs after AP account hijack

Advertisement
By Agence France-Presse | Updated: 25 April 2013 16:18 IST
A hijacked Associated Press Twitter account that rattled markets with false word of an attack on the White House put the security of social media in the crosshairs Wednesday.

The stock market rebounded from the nosedive triggered Tuesday by the bogus tweet and the AP posted a message on Twitter that its account "which was suspended after being hacked, has been secured and is back up."

The AP Twitter page indicated more than 1.8 million followers as of early evening in San Francisco, where the one-to-many messaging service has its headquarters.

What remained were questions as to whether security was tight enough on Twitter and other popular social networks in an age when people increasingly turn to posts from friends or strangers for reliable news and information.

Advertisement

Twitter was firm that evaluating and improving defenses at the service remains an ongoing priority and that the hijacking of the AP account didn't prompt any immediate moves to toughen security.

Advertisement

AP's Twitter account appeared to have been breached after hackers tricked someone into revealing a password with a deceptive email message in what is referred to as a "phishing" attack.

Some online reports contended that Twitter was considering "two-factor authentication" that would require users to either know something or do something aside from just type in passwords to access accounts.

Advertisement

"When you look at the problem in mass, the most critical thing we see is people just have horrendous passwords and use them all over the web," said Mark Risher, chief and founder of Impermium, an Internet security firm.

While incorporating a second step such as sending a confirmation code in a message to an email account or mobile phone associated with a user's account is a big improvement, even that defense is flawed, he said.

Advertisement

Risher was 'spam czar' at Yahoo! Mail before leaving the Internet pioneer and launching Impermium in 2010. His team includes Sameer Bhalotra, a former senior director of cybersecurity for the White House.

Phishing attacks are becoming increasingly sophisticated and convincing, sometimes with information harvested from social networks used to make pitches more personal and believable to specific targets, according to Risher.

A person conned into giving hackers a password could just as easily be asked for a second bit of information needed to get into an account, he reasoned.

"You really can't just expect users to never get duped, because they always will," Risher said. "Service providers should never be satisfied with a password."

Adding multiple layers of security to get into accounts treads on the ease of using online services, forcing social networks to risk aggravating members.

"There is a trade-off between convenience and safety," he said. "It is like putting five deadlock bolts on the door. It would make you more secure but it really would be a hassle if you wanted to pop out to the corner store."

Impermium and other companies specialize in ways to spot "bad guys" who use stolen passwords to get into accounts.

Signs watched for include whether an account is being accessed from a smartphone other than one typically used or if the visitor appeared to be trying to cover their tracks.

Last month, Twitter arranged with major web email service providers Google, Yahoo! and AOL to reject emails claiming to be from Twitter if they didn't have a special protocol that acts as a "handshake" of authenticity.

The intent was to block phishing email messages from even reaching targets. Twitter maintained that it has a variety of ideas about hardening security but would not disclose details.

"The answer is the service providers," Risher said. "Just like in the real world where a bank doesn't say that once you make it past the door you can do whatever you want."

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. Vivo X300 FE Reportedly Bags IMDA and TUV Certifications Ahead of Launch
  2. Apple to Reportedly Launch Low-Cost MacBook in 'Playful Colors' in March
  3. Samsung Galaxy S26+ Reportedly Listed for Sale Online Ahead of Launch
  4. Anthropic's First Indian Office in Bengaluru Is Now Open
  5. Here's When Samsung's Privacy Display Feature Might Arrive on a MacBook
  6. Lava Bold N2 Will Be Launched in India on This Date: See Expected Specs
  7. Realme P4 Lite India Launch Date, Design, Colourways, Key Features Revealed
  8. Oppo K14x 5G With 6,500mAh Battery Goes on Sale in India: See Price, Offers
  1. X Building Smart 'Cashtags' to Let Users Check Cryptocurrency Prices in Real-Time
  2. Samsung Galaxy A27 5G Listing on IMEI Database Suggests a Galaxy A26 Successor Is on the Way
  3. Anthropic Inaugurates First Indian Office in Bengaluru, Starts Hiring Local Talent
  4. Apple Tipped to Adopt Samsung's Privacy Display Technology for MacBook Models by 2029
  5. Oppo Find X10 Series Tipped to Launch in H2 2026 With Built-In Magnets for Wireless Charging
  6. AMD and TCS to Co-Develop Helios AI Data Centre Architecture, Deliver 200MW Data Centre Blueprint
  7. Tecno Spark 50 4G Tipped to Launch Globally Soon; Design, Colourways, Key Features Leaked
  8. Lava Bold N2 India Launch Date Revealed; Will Be Exclusively Available via Amazon
  9. Government Green Lights Rs. 10,000 Crore Fund of Funds 2.0 Under the Startup India Mission
  10. Samsung’s 'Wide' Galaxy Z Fold Design Revealed via Leaked One UI 9 Animations
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.