Remember those scam callers who pretend to be the bank’s manager, without even knowing which bank you’ve got an account in? They ask for your card details for some verification shit.
Almost nobody gets tricked into that anymore. I don’t even think they’re effective.
But you know what’s surprising though? The technique that was used in these scam calls is one of the many techniques that made the Twitter hack possible. At least that’s what Twitter believes, as of now.
The hack has affected 130 accounts and stole $120,000 worth in BTC.
Essentially, this hack wasn’t due to a software bug, but rather a human bug.
Two days after the attack, the New York Times published their interaction with two of guys behind the attack. I recommend reading it but here’s a summary:
The main guy behind the hack, known as Kirk, told the other two that he works at Twitter and demoed his ability to access Twitter’s internal support tool, which is available to only some Twitter employees.But the other two believe he wasn’t a Twitter employee because he was too willing to damage the company.
We don’t yet know whether he was a Twitter employee or knew/targeted someone who was.
But anyway, he could use Twitter’s internal tool that allowed him to take control of 130 Twitter accounts.
And this raises two questions:
Let’s answer the second one first.
Remember the fraudulent bank call mentioned in the introduction? Twitter’s investigation so far suggests the same kind of technique was used to trick the employee into giving away his access.
No, I don’t mean the hacker posing as CEO Jack Dorsey called an employee and asked for the access.
(Twitter employees aren’t that dumb to not ask Dorsey what happened to his access. Pun-intended.)
pun-intended.
The fraud bank call scam is called phishing, where the crook tries to convince the target into giving away some confidential information by showing urgency. It is one of many Social Engineering Techniques.
Social engineering techniques are techniques for psychological tricking of people to make them do certain actions or to give confidential information like passwords or PINs.
And that’s probably what the attacker did—tricked an employee into giving away his access to the tool.
So essentially, this hack wasn’t due to a software bug, but rather a human bug.
Social Engineering is based on these 6 principles of human behaviour:
Based on these principles, they’re several methods of social engineering. We don’t yet know which technique(s) was used but here are some popular ones:
You can find more here.
What was done to prevent bank call frauds? People were educated.
And that’s what Twitter’s doing. They’re rolling out some company-wide training to guard against social engineering tactics.
But most importantly, employees shouldn’t have access to millions of people’s data in the first place.
This brings us to the second question:
Yes. That’s what the attackers abused in this hack. They used Twitter’s very own internal support tool to gain access to 130 accounts. And that means any Twitter employee who has this access can do this too.
The hackers gave NYTimes a screenshot of the tool too. Here’s it:
Credits: NYTimes
Looking at this tool, here’s what I guess the hackers did:
Note: There may be more options on the tool. Because the screenshot looks incomplete.
During the hack, the hackers:
And this all wouldn’t have been possible without the Twitter internal tool.
Also, all Twitter employees who have this access can do the same.
And Twitter brought down anybody’s tweet that contained the image of this tool. It’s almost like denying its existence.
But this tool has so much potential that it’s not the first time someone misused this.
And not only Twitter,
Getting back to Twitter, when TechCrunch asked Twitter to comment on what it has done to prevent anything like this from happening in the future, Twitter instead of directly replying gave a statement that says:
“ … Our company limits access to sensitive account information to a limited group of trained and vetted employees. …”
That’s personal data of over 300 million users. Nobody should have access to it. Not even Jack Dorsey. (Mark Zuckerberg would disagree here, though.)
While all that privacy concerns hover over the micro-blogging platform, here’s one more:
I mean c’mon even WhatsApp says it’s end-to-end encrypted.
End-to-end encryption means nobody except the people in the conversation can read the messages, not even Twitter. (If you’re asking what’s end-to-end encryption, read this.)
Two years back, CEO Jack Dorsey reportedly said the company “was working on end-to-end encrypted direct messages.”
And we still don’t see it happening.
Hackers are now looking beyond software vulnerabilities to disrupt systems. Software bugs, at least, can be fixed with some code changes. But human bugs? Not so easily.
So, is it right for Twitter or any social network to give access to data of millions of people into a few hands?
In a world where data means power, data autocracy wouldn’t do any good.
It’s time for us to ask why Twitter isn’t end-to-end encrypted. Why still a bunch of Twitter employee can see personal data of over 300 million users?
It’s time for us to ask Twitter “What’s happening?!”
Previously published here.