Twitter Hackers Used 'Phone Spear Phishing Attack' to Pull Off Bitcoin Scam

Twitter has provided another update on the security breach two weeks ago that saw the Twitter accounts of Apple and other high-profile figures and companies hacked by bitcoin scammers.

apple bitcoin hack
According to the company, a small number of employees were targeted in a "phone spear phishing attack," suggesting that hackers called some of its staff and duped them into thinking they were speaking with fellow Twitter employees, leading them to reveal the credentials the hackers needed to access internal account support tools.

The attack on July 15, 2020, targeted a small number of employees through a phone spear phishing attack. This attack relied on a significant and concerted attempt to mislead certain employees and exploit human vulnerabilities to gain access to our internal systems.

Twitter previously called the hack a "coordinated social engineering attack" that had targeted some employees with access to internal systems. The internal tools were used to target 130 accounts, and for 45 of those accounts, hackers initiated a password reset and had full access to the account to send tweets.

For the 130 accounts that were breached, which included the accounts of Tesla CEO Elon Musk, former U.S. President Barack Obama, former Microsoft CEO Bill Gates, Amazon CEO Jeff Bezos, presidential candidate Joe Biden, and others, hackers were able to see personal information like email addresses and phone numbers, and for some accounts taken over, additional information was available, including Direct Messages.


Following the attack, Twitter temporarily locked accounts for some users and limited features. Most of those features are now back, but some, such as the "Your Twitter Data" download feature, are still not working as usual.

Twitter says it is taking a "hard look" at how it can improve the sophistication of its internal tools and systems, and in the meantime it has significantly limited access to them until it can safely resume normal operations.

Tag: Twitter

Popular Stories

Aston Martin CarPlay Ultra Screen

Apple's CarPlay Ultra to Expand to These Vehicle Brands Later This Year

Sunday February 1, 2026 10:08 am PST by
Last year, Apple launched CarPlay Ultra, the long-awaited next-generation version of its CarPlay software system for vehicles. Nearly nine months later, CarPlay Ultra is still limited to Aston Martin's latest luxury vehicles, but that should change fairly soon. In May 2025, Apple said many other vehicle brands planned to offer CarPlay Ultra, including Hyundai, Kia, and Genesis. In his Powe...
Apple Logo Black

Apple Just Made Its Second-Biggest Acquisition Ever After Beats

Thursday January 29, 2026 10:07 am PST by
Apple today confirmed to Reuters that it has acquired Q.ai, an Israeli startup that is working on artificial intelligence technology for audio. Apple paid close to $2 billion for Q.ai, according to sources cited by the Financial Times. That would make this Apple's second-biggest acquisition ever, after it paid $3 billion for the popular headphone and audio brand Beats in 2014. Q.ai has...
Apple Logo Black

Apple's Next Launch is 'Imminent'

Sunday February 1, 2026 12:31 pm PST by
The calendar has turned to February, and a new report indicates that Apple's next product launch is "imminent," in the form of new MacBook Pro models. "All signs point to an imminent launch of next-generation MacBook Pros that retain the current form factor but deliver faster chips," Bloomberg's Mark Gurman said on Sunday. "I'm told the new models — code-named J714 and J716 — are slated...
14 inch MacBook Pro Keyboard

Apple Changes How You Order a Mac

Saturday January 31, 2026 10:51 am PST by
Apple recently updated its online store with a new ordering process for Macs, including the MacBook Air, MacBook Pro, iMac, Mac mini, Mac Studio, and Mac Pro. There used to be a handful of standard configurations available for each Mac, but now you must configure a Mac entirely from scratch on a feature-by-feature basis. In other words, ordering a new Mac now works much like ordering an...
Apple MacBook Pro M4 hero

New MacBook Pros Reportedly Launching Alongside macOS 26.3

Sunday February 1, 2026 5:42 am PST by
Apple is planning to launch new MacBook Pro models with M5 Pro and M5 Max chips alongside macOS 26.3, according to Bloomberg's Mark Gurman. "Apple's faster MacBook Pros are planned for the macOS 26.3 release cycle," wrote Gurman, in his Power On newsletter today. "I'm told the new models — code-named J714 and J716 — are slated for the macOS 26.3 software cycle, which runs from...

Top Rated Comments

jchap Avatar
72 months ago
Despite all the sophisticated security measures a company might take, in the end it’s the human factor that brings it all down...
Score: 10 Votes (Like | Disagree)
JosephAW Avatar
72 months ago
My 80 yr old mother gets calls like this and she doesn't fall for it, what kind of training do they provide for their employees if any?
Score: 7 Votes (Like | Disagree)
AlexGraphicD Avatar
72 months ago
I call this BS. They’re trying to cover up for something else more insidious.
Score: 5 Votes (Like | Disagree)
Crowbot Avatar
72 months ago

Despite all the sophisticated security measures a company might take, in the end it’s the human factor that brings it all down...
Right. It's always been easier to convince someone to give you the key than figuring out how to make the key.
Score: 3 Votes (Like | Disagree)
ArPe Avatar
72 months ago

Was it just me or it is actually baffling to hear that their employees were victims of a phone spear phishing attack, which somehow gave the hackers access to Twitter's "internal tool"?

This is just bizarre.........
Bizarre that Twitter employees have an internal tool that gives them permission to post in your name on your Twitter accounts. What if Twitter decided to commandeer all those millions of fake or dormant accounts to manipulate or misinform the public?what if they already do this to some extent? And how much editorial power do they have to control what is allowed to ‘trend’ in a positive or negative light? Social engineering should be regulated otherwise it belongs to the highest bidders and advertisers. We’ve already seen how these platforms can be gamed with dark money to cause division and harm.
Score: 2 Votes (Like | Disagree)
Anson_431 Avatar
72 months ago
Was it just me or it is actually baffling to hear that their employees were victims of a phone spear phishing attack, which somehow gave the hackers access to Twitter's "internal tool"?

This is just bizarre.........
Score: 2 Votes (Like | Disagree)