Skip to Content

Twitter Hackers Used 'Phone Spear Phishing Attack' to Pull Off Bitcoin Scam

Twitter has provided another update on the security breach two weeks ago that saw the Twitter accounts of Apple and other high-profile figures and companies hacked by bitcoin scammers.

apple bitcoin hack
According to the company, a small number of employees were targeted in a "phone spear phishing attack," suggesting that hackers called some of its staff and duped them into thinking they were speaking with fellow Twitter employees, leading them to reveal the credentials the hackers needed to access internal account support tools.

The attack on July 15, 2020, targeted a small number of employees through a phone spear phishing attack. This attack relied on a significant and concerted attempt to mislead certain employees and exploit human vulnerabilities to gain access to our internal systems.

Twitter previously called the hack a "coordinated social engineering attack" that had targeted some employees with access to internal systems. The internal tools were used to target 130 accounts, and for 45 of those accounts, hackers initiated a password reset and had full access to the account to send tweets.

For the 130 accounts that were breached, which included the accounts of Tesla CEO Elon Musk, former U.S. President Barack Obama, former Microsoft CEO Bill Gates, Amazon CEO Jeff Bezos, presidential candidate Joe Biden, and others, hackers were able to see personal information like email addresses and phone numbers, and for some accounts taken over, additional information was available, including Direct Messages.


Following the attack, Twitter temporarily locked accounts for some users and limited features. Most of those features are now back, but some, such as the "Your Twitter Data" download feature, are still not working as usual.

Twitter says it is taking a "hard look" at how it can improve the sophistication of its internal tools and systems, and in the meantime it has significantly limited access to them until it can safely resume normal operations.

Tag: Twitter

Popular Stories

iOS 27 Mock Quick

iOS 27 Will Reportedly Be Like Mac OS X Snow Leopard

Sunday March 15, 2026 9:42 am PDT by
In his Power On newsletter today, Bloomberg's Mark Gurman reiterated that iOS 27 will be similar to 2009's Mac OS X Snow Leopard, in the sense that one of Apple's biggest priorities is bug fixes for improved performance and stability. During WWDC 2008's State of the Union, Apple showed a slide that said Mac OS X Snow Leopard had "0 new features," as it opted to focus on performance and...
AirPods Max 2 Feature

Apple Announces AirPods Max 2 With H2 Chip and More

Monday March 16, 2026 6:12 am PDT by
Apple today unveiled AirPods Max 2, with key upgrades including the H2 chip, increased active noise cancellation, improved sound quality, and features such as Adaptive Audio, Conversation Awareness, Voice Isolation, and Live Translation. The new AirPods Max have the same overall design as the previous generation, with most of the new features coming from the upgrade to the H2 chip:- Adaptive ...
Apple Logo Sketch Feature

Apple Unveiled a Surprise New Product Today

Monday March 16, 2026 10:50 am PDT by
Surprise! Apple today unveiled the AirPods Max 2, despite no rumors suggesting that a new version of Apple's over-ear headphones were imminent. Key upgrades compared to the previous AirPods Max include Apple's H2 chip, increased active noise cancellation, improved sound quality, and features such as Adaptive Audio, Conversation Awareness, Voice Isolation, and Live Translation. AirPods Max ...

Top Rated Comments

jchap Avatar
74 months ago
Despite all the sophisticated security measures a company might take, in the end it’s the human factor that brings it all down...
Score: 10 Votes (Like | Disagree)
JosephAW Avatar
74 months ago
My 80 yr old mother gets calls like this and she doesn't fall for it, what kind of training do they provide for their employees if any?
Score: 7 Votes (Like | Disagree)
AlexGraphicD Avatar
74 months ago
I call this BS. They’re trying to cover up for something else more insidious.
Score: 5 Votes (Like | Disagree)
Crowbot Avatar
74 months ago

Despite all the sophisticated security measures a company might take, in the end it’s the human factor that brings it all down...
Right. It's always been easier to convince someone to give you the key than figuring out how to make the key.
Score: 3 Votes (Like | Disagree)
ArPe Avatar
73 months ago

Was it just me or it is actually baffling to hear that their employees were victims of a phone spear phishing attack, which somehow gave the hackers access to Twitter's "internal tool"?

This is just bizarre.........
Bizarre that Twitter employees have an internal tool that gives them permission to post in your name on your Twitter accounts. What if Twitter decided to commandeer all those millions of fake or dormant accounts to manipulate or misinform the public?what if they already do this to some extent? And how much editorial power do they have to control what is allowed to ‘trend’ in a positive or negative light? Social engineering should be regulated otherwise it belongs to the highest bidders and advertisers. We’ve already seen how these platforms can be gamed with dark money to cause division and harm.
Score: 2 Votes (Like | Disagree)
74 months ago
Was it just me or it is actually baffling to hear that their employees were victims of a phone spear phishing attack, which somehow gave the hackers access to Twitter's "internal tool"?

This is just bizarre.........
Score: 2 Votes (Like | Disagree)