Celebrity Travel: Twitter contractors reportedly spied on the accounts of Beyoncé and other celebrities by creating fake help desk tickets (TWTR)

0
70
Celebrity Travel: Twitter contractors reportedly spied on the accounts of Beyoncé and other celebrities by creating fake help desk tickets (TWTR)

Celebrity Travel:

Celebrity Travel: BeyonceCelebrity Travel: Beyonce



Checklist by Kevin Mazur/Getty Photos for Coachella


  • Twitter contractors responsible of monitoring tale security and fraud improperly accessed info from the accounts of celebrities, along with Beyoncé, Bloomberg reported Monday.
  • Dilapidated employees said Twitter’s internal controls were so lax that contractors were ready to stumble on customers’ cell telephone numbers, email addresses, and approximate locations by rising unsuitable abet desk requests, in preserving with Bloomberg.
  • Twitter’s security practices hang reach under intense scrutiny following a main hack of One hundred thirty well-liked of us and companies along with Barack Obama, Joe Biden, Jeff Bezos, Elon Musk, Kanye West, Apple and Uber.
  • Better than 1,000 employees and contractors had access to the interior tool at the core of the hack.
  • Discuss over with Industry Insider’s homepage for more tales.

Twitter’s lax internal policies allowed members of its security team to access the internal most info of giant name customers, along with Beyoncé, without their permission, Bloomberg reported Monday.

The security team, which is made up of 1,500 employees and contractors, has internal tools that permit it to stumble on customers’ cell telephone numbers, email addresses, and approximate net page info in repeat to show screen accounts for fraud and command violations, the document said.

Nevertheless long-established access to the tools and lenient rules spherical their use led some contractors to concern every other to glimpse on giant name accounts by submitting unsuitable abet desk tickets, used employees suggested Bloomberg.

Cognizant, the firm that employed a few of the contractors talked about, did no longer loyal now respond to Industry Insider’s demand for issue.

In an email to Industry Insider, a Twitter spokesperson said the firm doesn’t tolerate the misuse of internal tools, and that doing so could well per chance well pause in termination, nevertheless declined to issue on the say conditions reported by Bloomberg.

The level of access and believe an eye fixed on employees and contractors granted has reach under scrutiny in recent weeks after hackers received believe an eye fixed on of internal tools and hijacked the accounts of One hundred thirty high-profile folks and companies, allowing them to perpetuate a Bitcoin scam that doubtless netted them no longer no longer up to $a hundred and twenty,000.

Twitter said the incident modified into once the pause results of a “coordinated social engineering attack” — a approach that involves manipulating victims in repeat to kind info a couple of corporation — that allowed the hackers to manufacture access to internal tools finest readily available to Twitter’s assist teams.

With that tool, hackers were ready to stumble on customers’ internal most info, along with cell telephone numbers, email addresses, and in some conditions, non-public messages, Twitter said in a blog publish detailing what happened.

Final week, Reuters reported that better than 1,000 Twitter employees and contract employees had access to that same tool, making it difficult for the firm to guard towards hacks esteem this one.

Workers hang raised identical concerns spherical Twitter’s internal safety features on more than one occasions since no longer no longer up to 2015, along with to its board of administrators, nevertheless fixes were build on the abet burner in repeat to prioritize engineering tasks centered on making the firm more money, in preserving with Bloomberg.

LoadingSomething is loading.

More:

Twitter
Beyonce
Cybersecurity
Hacking

Chevron iconIt signifies an expandable allotment or menu, or infrequently outdated / next navigation recommendations.

Read More

LEAVE A REPLY

Please enter your comment!
Please enter your name here