{"id":4332,"date":"2020-07-17T10:56:51","date_gmt":"2020-07-17T10:56:51","guid":{"rendered":"https:\/\/signdesk.com\/in\/?p=4332"},"modified":"2025-09-17T07:05:33","modified_gmt":"2025-09-17T12:35:33","slug":"hackers-take-over-high-profile-twitter-accounts-in-bitcoin-scam","status":"publish","type":"post","link":"https:\/\/melento.ai\/en-in\/blog\/hackers-take-over-high-profile-twitter-accounts-in-bitcoin-scam","title":{"rendered":"Hackers take over high profile Twitter accounts in Bitcoin scam"},"content":{"rendered":"<h2><span style=\"font-weight: 400; color: #008000;\"><b>What happened?<\/b><\/span><\/h2>\n<p><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">On Wednesday, July 15, 2020, several high-profile <a style=\"color: #333300; font-size: 16px; font-family: 'open sans';\" href=\"https:\/\/twitter.com\/\">Twitter accounts<\/a> were hacked and used for a \u201csmash-and-grab\u201d type scam. The scam involved these compromised accounts sending out <a style=\"color: #333300; font-size: 16px; font-family: 'open sans';\" href=\"https:\/\/twitter.com\/\">tweets<\/a> requesting BTC donations to a wallet (presumably the hackers\u2019), which would be doubled and returned to the donors.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">The <a style=\"color: #333300; font-size: 16px; font-family: 'open sans';\" href=\"https:\/\/twitter.com\/\">tweets<\/a> generally followed this template &#8211; \u201cI am giving back to the community! All <a style=\"color: #333300; font-size: 16px; font-family: 'open sans';\" href=\"https:\/\/en.wikipedia.org\/wiki\/Bitcoin\">Bitcoin<\/a> sent to the address below will be sent back, doubled. Only doing this for 30 minutes.\u201d<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4335 aligncenter\" src=\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2020\/07\/twitter.jpg\" alt=\"Tweets-attack\" width=\"628\" height=\"333\" \/><\/p>\n<p><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">This is called a \u201c<strong>smash-and-grab<\/strong>\u201d because hackers have only a short time window to extract money from the scam before their operations are shut down.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">The accounts hacked belonged to celebrities and public figures including &#8211; Joe Biden, Elon Musk, Barack Obama, Kanye West, Jeff Bezos, Bill Gates, etc. Several business accounts including those of Cash App, Uber, Apple, <a style=\"color: #333300; font-size: 16px; font-family: 'open sans';\" href=\"https:\/\/en.wikipedia.org\/wiki\/Bitcoin\">bitcoin<\/a>, and coinbase. Other businesses accounts of cryptocurrencies were also compromised.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">These <a style=\"color: #333300; font-size: 16px; font-family: 'open sans';\" href=\"https:\/\/twitter.com\/\">tweets<\/a> have since been taken down and control of the accounts in question have been returned to their owners.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">The hackers have made out with an estimated $120,000, but this could turn out to be a conservative estimate as there are over 70,000 unverified transactions on the BTC wallet that was provided.<\/span><\/p>\n<h2><span style=\"color: #008000;\"><strong>How did this happen?<\/strong><\/span><\/h2>\n<p><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Reports differ, but the consensus is that a group of hackers received access to an internal administrative tool used by Twitter employees, either by paying off employees, or other means.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">This tool was apparently used to change account-level settings of the accounts, including confirmation mails, which were used to force password resets and gain control of even those accounts with multi-factor authentication.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">The tool apparently consists of a panel that was used to change ownership of the high profile accounts that were hacked. Here\u2019s a screenshot taken by a <a style=\"color: #333300; font-size: 16px; font-family: 'open sans';\" href=\"http:\/\/twitter.com\">Twitter<\/a> user of the panel.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4336 aligncenter\" src=\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2020\/07\/socially-engineered-1-1-1.jpg\" alt=\"socially-engineered\" width=\"628\" height=\"360\" \/><\/p>\n<p><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">The story is still developing and twitter has been mostly silent about this, but it has tacitly acknowledged that this was a \u201c<strong>socially engineered<\/strong>\u201d attack suggesting that employees might be involved.<\/span><\/p>\n<p><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">It\u2019s also come to light that the Twitter dev team was supposed to implement a new API on the day of the hack, this might be an alternative to the theory of social engineering, and the hack could be a case of someone exploiting bugs in the old API before the new one was implemented.<\/span><\/p>\n<h2><span style=\"color: #008000;\"><strong>Who was responsible?<\/strong><\/span><\/h2>\n<p><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">There is again no clear consensus.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Some of the <a style=\"color: #333300; font-size: 16px; font-family: 'open sans';\" href=\"https:\/\/twitter.com\/\">tweets<\/a> directed users to a website &#8211; cryptoforhealth.com, which also has an Instagram account on which the creators of the account took credit for the hack and stated that the money is for \u201ccharity\u201d.\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-4337 aligncenter\" src=\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2020\/07\/Instagram.jpg\" alt=\"Instagram\" width=\"572\" height=\"498\" \/><\/p>\n<p><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Other reports indict members of a hacking forum \u201cOGUsers\u201d who state that they had already been using the internal admin twitter tool for this scam and the scam on July 15\u00a0 was simply an escalation. <\/span><\/p>\n<h2><span style=\"color: #008000;\"><strong>Why was this done?<\/strong><\/span><\/h2>\n<p><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Theories abound that this was more than a scam and was politically motivated or motivated by business interests due to the nature of the accounts that were hacked.<\/span><\/p>\n<p><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">It\u2019s been speculated that this attack\u2019s purpose is blackmail as the hackers could access the DMs of the hacked accounts. It could also be a demonstration to a client given the relatively small amount of money extracted.<\/span><\/p>\n<h2><span style=\"color: #008000;\"><strong>How is Twitter reacting?<\/strong><\/span><\/h2>\n<p><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Jack Dorsey has stated that twitter is looking seriously into these attacks and that the usage of the internal tool in question has now been limited. <\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4334 aligncenter\" src=\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2020\/07\/Untitled.jpg\" alt=\"Tweet-again\" width=\"469\" height=\"336\" \/><\/p>\n<p><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Most accounts should be able to <a style=\"color: #333300; font-size: 16px; font-family: 'open sans';\" href=\"https:\/\/twitter.com\/\">Tweet<\/a> again. As we continue working on a fix, this functionality may come and go. We&#8217;re working to get things back to normal as quickly as possible.<\/span><\/p>\n<p><span style=\"color: #333300; font-size: 16px; font-family: 'open sans';\"><span style=\"font-weight: 400;\">\u2014 Twitter Support (@TwitterSupport) <\/span><strong><a style=\"color: #333300; font-size: 16px; font-family: 'open sans';\" href=\"https:\/\/twitter.com\/TwitterSupport\/status\/1283562446196596737?ref_src=twsrc%5Etfw\">July 16, 2020<\/a><\/strong><\/span><\/p>\n<p><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Experts say that given the access that the hackers had, this could have been much worse.<\/span><\/p>\n<h2><span style=\"color: #008000;\"><strong>What does this mean for you?\u00a0<\/strong><\/span><\/h2>\n<p><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">All of us use social media regularly for a host of activities. This high-profile attack should serve as an indication to both individuals and businesses, that we must take our <a style=\"color: #333300; font-size: 16px; font-family: 'open sans';\" href=\"https:\/\/en.wikipedia.org\/wiki\/Computer_security\">cyber security<\/a> more seriously.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Here are some precautions for both individuals and businesses, to safeguard themselves from spam-based attacks online.<\/span><\/p>\n<h2><span style=\"color: #008000;\"><strong>How can individuals &amp; businesses protect themselves against spam-based attacks?<\/strong><\/span><\/h2>\n<p><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Spam-based attacks rely on hackers getting a hold of email IDs, so here are precautions individuals can take to protect themselves from this attack.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Do not post email addresses in public forums, chat rooms, or untrusted forms<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Only subscribe to trusted newsletters<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Use multiple &amp; disposable email addresses<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Use a spam filter. These come in two types &#8211; content-based &amp; source-based. Generally source-based filters are harder to get past<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Use long email addresses as these are less susceptible to brute-force attacks<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">If you receive a spam email:<\/span>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Do not click on it<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Do not download any attachments from it<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Do not try to unsubscribe from the message<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Report it<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Generally be wary of suspicious-looking emails, forms, pop-ups or websites, and never post your email to any of these<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Here\u2019s how businesses can safeguard themselves from spam-based attacks:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Make sure the SMTP server you\u2019re using\u00a0<\/span>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Does not relay unauthorized mails<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Has implemented client authentication<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Defines a maximum number of recipients per message<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Uses separate ports for submission and message relay\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Make sure your ISP<\/span>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Stops all open relays<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Controls open proxy servers<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Implements rate limits in outbound email traffic<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Monitors web-based email submission forms<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Logs sources of mails generated within the network<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Restrict network admin rights to a handful of people<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Invest in cybersecurity software and strong firewalls<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Encrypt and backup all your important data and store it offline\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Keep your hardware safe\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Educate employees on <a style=\"color: #333300; font-size: 16px; font-family: 'open sans';\" href=\"https:\/\/en.wikipedia.org\/wiki\/Computer_security\">cyber security<\/a> best practices<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">If possible, follow the zero trust approach:<\/span>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Verify every user<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Validate every device<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #333300; font-size: 16px; font-family: 'open sans';\">Limit access based on user roles &amp; requirements<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>What happened? On Wednesday, July 15, 2020, several high-profile Twitter accounts were hacked and used for a \u201csmash-and-grab\u201d type scam. The scam involved these compromised accounts sending out tweets requesting BTC donations to a wallet (presumably the hackers\u2019), which would be doubled and returned to the donors.\u00a0\u00a0 The tweets generally followed this template &#8211; \u201cI [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page_templates\/blog-new-3.php","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[10],"tags":[107,266,267,510,511,513,514,515,559,2117,2126,2233],"class_list":["post-4332","post","type-post","status-publish","format-standard","hentry","category-cyber-security","tag-accounts-hack","tag-bitcoin","tag-bitcoin-scam","tag-cyber-security","tag-cybersecurity","tag-data-protection","tag-data-security","tag-dataprivacylaws","tag-digital-data","tag-smash-and-grab","tag-spam-based-attacks","tag-twitter-attack"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Twitter accounts hacked in Bitcoin scam | Melento (Formerly SignDesk)<\/title>\n<meta name=\"description\" content=\"Hackers took over several high profile Twitter accounts for a BTC scam on July 15, Click to read more &amp; learn how to protect yourself from spam attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/melento.ai\/en-in\/blog\/hackers-take-over-high-profile-twitter-accounts-in-bitcoin-scam\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Twitter accounts hacked in Bitcoin scam | Melento (Formerly SignDesk)\" \/>\n<meta property=\"og:description\" content=\"Hackers took over several high profile Twitter accounts for a BTC scam on July 15, Click to read more &amp; learn how to protect yourself from spam attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/melento.ai\/en-in\/blog\/hackers-take-over-high-profile-twitter-accounts-in-bitcoin-scam\" \/>\n<meta property=\"og:site_name\" content=\"Melento (Formerly SignDesk)\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-17T10:56:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-17T12:35:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/signdesk.com\/in\/wp-content\/uploads\/2020\/07\/twitter.jpg\" \/>\n<meta name=\"author\" content=\"Abhijith NS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Abhijith NS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/hackers-take-over-high-profile-twitter-accounts-in-bitcoin-scam\",\"url\":\"https:\/\/melento.ai\/en-in\/blog\/hackers-take-over-high-profile-twitter-accounts-in-bitcoin-scam\",\"name\":\"Twitter accounts hacked in Bitcoin scam | Melento (Formerly SignDesk)\",\"isPartOf\":{\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/hackers-take-over-high-profile-twitter-accounts-in-bitcoin-scam#primaryimage\"},\"image\":{\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/hackers-take-over-high-profile-twitter-accounts-in-bitcoin-scam#primaryimage\"},\"thumbnailUrl\":\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2020\/07\/twitter.jpg\",\"datePublished\":\"2020-07-17T10:56:51+00:00\",\"dateModified\":\"2025-09-17T12:35:33+00:00\",\"author\":{\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/ec422007f10d83f117454e7779dc4d23\"},\"description\":\"Hackers took over several high profile Twitter accounts for a BTC scam on July 15, Click to read more & learn how to protect yourself from spam attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/hackers-take-over-high-profile-twitter-accounts-in-bitcoin-scam#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/melento.ai\/en-in\/blog\/hackers-take-over-high-profile-twitter-accounts-in-bitcoin-scam\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/hackers-take-over-high-profile-twitter-accounts-in-bitcoin-scam#primaryimage\",\"url\":\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2020\/07\/twitter.jpg\",\"contentUrl\":\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2020\/07\/twitter.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/hackers-take-over-high-profile-twitter-accounts-in-bitcoin-scam#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/melento.ai\/en-in\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers take over high profile Twitter accounts in Bitcoin scam\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/#website\",\"url\":\"https:\/\/melento.ai\/en-in\/blog\/\",\"name\":\"Melento\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/melento.ai\/en-in\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/ec422007f10d83f117454e7779dc4d23\",\"name\":\"Abhijith NS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/eae9ee21b4305af36d9e50b14e1f8a195d238df959bb0003ea7d069b856acbd4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/eae9ee21b4305af36d9e50b14e1f8a195d238df959bb0003ea7d069b856acbd4?s=96&d=mm&r=g\",\"caption\":\"Abhijith NS\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Twitter accounts hacked in Bitcoin scam | Melento (Formerly SignDesk)","description":"Hackers took over several high profile Twitter accounts for a BTC scam on July 15, Click to read more & learn how to protect yourself from spam attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/melento.ai\/en-in\/blog\/hackers-take-over-high-profile-twitter-accounts-in-bitcoin-scam","og_locale":"en_US","og_type":"article","og_title":"Twitter accounts hacked in Bitcoin scam | Melento (Formerly SignDesk)","og_description":"Hackers took over several high profile Twitter accounts for a BTC scam on July 15, Click to read more & learn how to protect yourself from spam attacks.","og_url":"https:\/\/melento.ai\/en-in\/blog\/hackers-take-over-high-profile-twitter-accounts-in-bitcoin-scam","og_site_name":"Melento (Formerly SignDesk)","article_published_time":"2020-07-17T10:56:51+00:00","article_modified_time":"2025-09-17T12:35:33+00:00","og_image":[{"url":"https:\/\/signdesk.com\/in\/wp-content\/uploads\/2020\/07\/twitter.jpg","type":"","width":"","height":""}],"author":"Abhijith NS","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Abhijith NS","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/melento.ai\/en-in\/blog\/hackers-take-over-high-profile-twitter-accounts-in-bitcoin-scam","url":"https:\/\/melento.ai\/en-in\/blog\/hackers-take-over-high-profile-twitter-accounts-in-bitcoin-scam","name":"Twitter accounts hacked in Bitcoin scam | Melento (Formerly SignDesk)","isPartOf":{"@id":"https:\/\/melento.ai\/en-in\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/melento.ai\/en-in\/blog\/hackers-take-over-high-profile-twitter-accounts-in-bitcoin-scam#primaryimage"},"image":{"@id":"https:\/\/melento.ai\/en-in\/blog\/hackers-take-over-high-profile-twitter-accounts-in-bitcoin-scam#primaryimage"},"thumbnailUrl":"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2020\/07\/twitter.jpg","datePublished":"2020-07-17T10:56:51+00:00","dateModified":"2025-09-17T12:35:33+00:00","author":{"@id":"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/ec422007f10d83f117454e7779dc4d23"},"description":"Hackers took over several high profile Twitter accounts for a BTC scam on July 15, Click to read more & learn how to protect yourself from spam attacks.","breadcrumb":{"@id":"https:\/\/melento.ai\/en-in\/blog\/hackers-take-over-high-profile-twitter-accounts-in-bitcoin-scam#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/melento.ai\/en-in\/blog\/hackers-take-over-high-profile-twitter-accounts-in-bitcoin-scam"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/melento.ai\/en-in\/blog\/hackers-take-over-high-profile-twitter-accounts-in-bitcoin-scam#primaryimage","url":"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2020\/07\/twitter.jpg","contentUrl":"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2020\/07\/twitter.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/melento.ai\/en-in\/blog\/hackers-take-over-high-profile-twitter-accounts-in-bitcoin-scam#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/melento.ai\/en-in\/blog\/"},{"@type":"ListItem","position":2,"name":"Hackers take over high profile Twitter accounts in Bitcoin scam"}]},{"@type":"WebSite","@id":"https:\/\/melento.ai\/en-in\/blog\/#website","url":"https:\/\/melento.ai\/en-in\/blog\/","name":"Melento","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/melento.ai\/en-in\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/ec422007f10d83f117454e7779dc4d23","name":"Abhijith NS","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/eae9ee21b4305af36d9e50b14e1f8a195d238df959bb0003ea7d069b856acbd4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/eae9ee21b4305af36d9e50b14e1f8a195d238df959bb0003ea7d069b856acbd4?s=96&d=mm&r=g","caption":"Abhijith NS"}}]}},"_links":{"self":[{"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/posts\/4332","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/comments?post=4332"}],"version-history":[{"count":0,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/posts\/4332\/revisions"}],"wp:attachment":[{"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/media?parent=4332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/categories?post=4332"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/tags?post=4332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}