Twitter hackers in bitcoin fraud accessed private messages of 36 accounts, Twitter says

Twitter has revealed that the hackers in the recent bitcoin scam accessed the private messages of 36 accounts. 

Recall that last week, a number of bitcoin hackers accessed the account of prominent people and organizations, offering to double $1000 dollars sent to a specific bitcoin address.

Affected accounts include those of Democratic presidential candidate Joe Biden, former President Barack Obama, Tesla CEO Elon Musk, Bill Gates, Jeff Bezos, Kanye West, Mike Bloomberg, Apple and Uber among others.

The hackers reportedly received over $120,000 from over 500 transactions and the scam has been said to be one of the largest ever in the history of social media scams.

Now, the social media site is providing more information, saying that the hackers did more than just scam people of their hard-earned money. They also accessed private messages of 36 prominent people.

One of these people is a politician from the Netherlands. The information accessed includes phone numbers and emails are these are visible to Twitter engineers working on support tools.

The FBI has since started investigations into whether hackers bribed a Twitter employee to get access into verified accounts and post messages soliciting for bitcoins.

Photo of author

About The Author

Sidomex

16 thoughts on “Twitter hackers in bitcoin fraud accessed private messages of 36 accounts, Twitter says”

  1. Pingback: herbal tea
  2. Pingback: evo-bar
  3. Pingback: Dan Helmer
  4. Pingback: go
  5. Pingback: Loring Ward
  6. Pingback: pay debt
  7. Pingback: Ufa191 ???????
  8. Pingback: my response
  9. Pingback: my link
  10. Pingback: CBD Benefits
  11. Pingback: maxbet
  12. Pingback: ?????????

Leave a Comment

Sidomex-Entertainment

SidomexEntertainment is your one-stop-shop for news, entertainment, fashion, music, sports and lifestyle. We provide you with the latest breaking news and videos straight from the entertainment industry.

Follow Us
%d bloggers like this: