Twitter: Hacker claims to have stolen millions of social network accounts and demands ransom from Elon Musk

1025

With all the media exposure it has had, it is natural that the Twitter also become interesting for hackers and all those who are dedicated to stealing information on the Internet.

Another case is now taking shape, with a hacker offering data from 400 million accounts on this social network for sale. His proposal goes further and wants Elon Musk or Twitter itself to make this purchase to avoid problems.

Twitter has had several problems over the years when it comes to the security of its users. Several cases of theft of account data are known, which end up in the hands of hackers and others, who then try to monetize this information.

The latest data leak is now for sale on a forum, with evidence that it is real. This is information from 400 million accounts, which were apparently removed from the social network in yet another security breach that affected this service. This data includes phone numbers, email addresses of many celebrities, companies and regular users.

BUT: Elon Musk wants to reduce the number of people who can vote on Twitter

To prove that the data are real and reliable, there is a sample of 1000 accounts. In the data that can be accessed, there is personal information from users such as Donald Trump Jr., security expert Brian Krebs and other famous people.

This hacker is even proposing that Elon Musk himself make the purchase. As he argues, this could be Twitter's way of escaping heavy fines associated with the RGPS and other user protection mechanisms. It gives examples of how Facebook and other networks have been fined.

Although Elon Musk has apparently ignored this proposal, Twitter has already reacted. It alleges that the data presented come from other previous leaks and that, as such, they do not have any value or validity other than that which is already in progress. Several security analysts have already contradicted this idea.

In any case, data exists and is at the mercy of whoever pays the highest price. This is sensitive information that cannot be obtained directly, having to exploit a vulnerability in one of the many APIs, as will have happened this time.

LEAVE AN ANSWER

Please enter your comment!
Please enter your name here