Sunday, April 27, 2025
HomeCyber Security NewsTwitter Hack - Barack Obama, Joe Biden, Elon Musk, Apple, and other...

Twitter Hack – Barack Obama, Joe Biden, Elon Musk, Apple, and other Twitter Accounts Hacked

Published on

SIEM as a Service

Follow Us on Google News

Several high-profile Twitter accounts hacked including Biden, billionaires, and corporate accounts hacked in Bitcoin scam. The scam appeared to be a targeted widespread operation that affects multiple accounts.

The scam appears to be tricking the users sending payments to a BTC address and in return, the attacker said that they would be sending doubling the payments.

The hack is something unusual, and still not know how the attack took place, in the hack attackers took over complete control of the account, also changed the email address.

- Advertisement - Google News

Twitter Hack

The widespread hack suggests that attackers may gain broad access to internal controls, the scam started after 4 PM ET and lasts for more than two hours.

Many high-profile accounts were hijacked in a quick rapid session, the chaos started after Tesla CEO Elon Musk’s Twitter account hacked and the attacker posted a bitcoin scam message.

Following that Microsoft co-founder Bill Gates’ account found to be compromised and the same scam message has been posted.

After the initial wave of tweets, the following high-profile Twitter accounts Apple, Uber, former President Barack Obama, Amazon CEO Jeff Bezos, Democratic presidential candidate Joe Biden, hip-hop mogul Kanye West, and former New York City mayor and billionaire Mike Bloomberg also posted with the same scam message.

The attack not only targets high-profile accounts, but it also targets popular Twitter accounts such as Cameron and Tyler Winklevoss’ Gemini cryptocurrency exchange and widely used wallet app Coinbase. In addition to that Square’s Cash App accounts found to be compromised.

Cameron Winklevoss mentioned in a tweet that the Gemini account has a strong password and also two-factor authentication enabled.

It seems some people felt with the scam and the attackers harvested around $120,000 with scam according to the BTC address. With all the scam messages posted the BTC address remains the same.

Twitter Internal Admin Tool

According to the Motherboard report following the hack of the high-profile Twitter account, attackers shared a snapshot of the Internal Twitter user admin tool used by employees of Twitter.

The motherboard also obtained the screenshots of the tool shared in the dark web, in one of the screenshots it shows Binance which is the part of the hack.

After more than an hour Twitter acknowledges the situation and posted a tweet “We are aware of a security incident impacting accounts on Twitter. We are investigating and taking steps to fix it. We will update everyone shortly.”

The company initially stopped the “ability to Tweet, reset your password, and some other account functionalities.”

Twitter CEO Jack Dorsey said that “Tough day for us at Twitter. We all feel terrible this happened. We’re diagnosing and will share everything we can when we have a more complete understanding of exactly what happened.”

https://twitter.com/jack/status/1283571658339397632

In a recent update, Twitter said that it was a result of the coordinated social engineering attack targeted a twitter employee who had access to internal systems and tools. Also, they are checking for other malicious activities with the accounts.

This story is developing. Stay tuned for updates.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Also Read

Twitter CEO Jack Dorsey Account Hacked using Sim Swapping Attack

Twitter Bug Exposed Location Data of iOS Users to Advertiser

India’s Biggest Star Amitabh Bachchan’s Twitter Account Hacked

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...