Strengthening The Weakest Link To Prevent Social Engineering Attacks

Twitter Inc. recently experienced its worst security breach in its 14-year existence. A number of high-profile Twitter accounts were hacked, including the accounts of former President Barack Obama, former Vice-President and current presidential candidate Joe Biden, Bill Gates, Elon Musk, and Warren Buffett.

The hacked accounts posted invitations for what appeared to be a Bitcoin scam. The promoted Bitcoin wallets collected around $120,000 in cryptocurrency. Twitter blocked posts from all verified accounts in response.

Twitter stated that it detected "a coordinated social engineering attack by people who successfully targeted some of our employees with access to internal systems and tools."

Twitter is trying to determine if the internal attack occurred because cybercriminals tricked employees with sophisticated phishing attacks or if employees deliberately gave hackers access to high-profile accounts.

Some cybersecurity experts believe that there is more to the attack than a cryptocurrency scam. They suggest the cybercriminals might have hacked high-profile accounts to distract from their stealing sensitive information, such as private personal messages or other confidential data that they will use later.

Twitter will likely look into employee logs, email, and phone records to determine if a failure in the authentication process allowed hackers access. The organization will also likely investigate what other data might have been compromised. Jamie Tarabay "Twitter Races to Unravel How Cyber-Attack Came From Inside" (Jul. 16, 2020).



All organizations, as well as individuals and families, are potential targets of social engineering. Social engineering attacks occur against CEOs as well as against home buyers purchasing their first home.

With social engineering attacks, cybercriminals either trick or manipulate employees into (knowingly or unknowingly) sharing confidential information or performing desired actions.

Social engineering attacks can include phishing campaigns, but also old- fashioned bribery and blackmail. 

In the above matter, one of the possibilities is that employees may not have been tricked but may have willingly provided their credentials to the criminals. Often the incentive involves promises, threats, or money.

No matter how the hack was accomplished, humans are the weakest link to cybersecurity.

The best way to prevent human negligence of any type is training. Employers should train employees to never respond to suspicious emails or phone calls and to notify your information technology department immediately if they believe they are the target of a social engineering attack.

Finally, create a written policy that states that any employee who knowingly shares information with a third party without authorization will face disciplinary and legal action.

Finally, your opinion is important to us. Please complete the opinion survey:


Identifying Employee Personality Typing May Help Blunt Cybercrime

New research finds that personality type may determine an employee's strengths and weaknesses as it relates to cyber threats. We examine. Read More

Bad State Actors And Criminals Are Focusing On Updates After SolarWinds Hack

Cybercriminals often hack organizations or spoof software updates to spread malware. We examine. Read More

Knowing Internal Online Habits Helps Limit The Risk Of Cloud-Based Malware Attacks

McAfee's second quarter report reveals a significant rise in malware attacks, particularly in cloud-based user accounts. We examine. Read More