Twitter Hackers Used 'Phone Spear Phishing Attack' to Pull Off Bitcoin Scam

Twitter has provided another update on the security breach two weeks ago that saw the Twitter accounts of Apple and other high-profile figures and companies hacked by bitcoin scammers.

apple bitcoin hack
According to the company, a small number of employees were targeted in a "phone spear phishing attack," suggesting that hackers called some of its staff and duped them into thinking they were speaking with fellow Twitter employees, leading them to reveal the credentials the hackers needed to access internal account support tools.

The attack on July 15, 2020, targeted a small number of employees through a phone spear phishing attack. This attack relied on a significant and concerted attempt to mislead certain employees and exploit human vulnerabilities to gain access to our internal systems.

Twitter previously called the hack a "coordinated social engineering attack" that had targeted some employees with access to internal systems. The internal tools were used to target 130 accounts, and for 45 of those accounts, hackers initiated a password reset and had full access to the account to send tweets.

For the 130 accounts that were breached, which included the accounts of Tesla CEO Elon Musk, former U.S. President Barack Obama, former Microsoft CEO Bill Gates, Amazon CEO Jeff Bezos, presidential candidate Joe Biden, and others, hackers were able to see personal information like email addresses and phone numbers, and for some accounts taken over, additional information was available, including Direct Messages.


Following the attack, Twitter temporarily locked accounts for some users and limited features. Most of those features are now back, but some, such as the "Your Twitter Data" download feature, are still not working as usual.

Twitter says it is taking a "hard look" at how it can improve the sophistication of its internal tools and systems, and in the meantime it has significantly limited access to them until it can safely resume normal operations.

Tag: Twitter

Popular Stories

maxresdefault

iPhone Fold: Launch, Pricing, and What to Expect From Apple's Foldable

Friday February 20, 2026 3:21 am PST by
Apple is expected to launch a new foldable iPhone this year, based on multiple rumors and credible sources. The long-awaited device has been rumored for years now, but signs increasingly suggest that Apple will release its first foldable device in 2026. Subscribe to the MacRumors YouTube channel for more videos. Below, we've collated an updated set of key details that have been leaked about ...
Apple Watch 15 Tips Every Owner Needs to Know Feature

Apple Watch: 15 Tips Every Owner Needs to Know

Thursday February 19, 2026 7:38 am PST by
Apple Watch is now eleven generations in, and packed with useful features that are easy to miss at first glance. To help you get more out of your new device, we've rounded up 15 practical tips you might not have discovered yet, including a few that long-time users often overlook. Bounce Between Two Apps On your Apple Watch, double-press the Digital Crown to see a deck of all currently...
Low Cost A18 Pro MacBook Feature Pink

Three Upcoming Apple Products Seemingly Spotted in macOS 26.3 Code

Friday February 20, 2026 7:36 am PST by
macOS 26.3 hints at Apple's rumored lower-cost MacBook, and two new Studio Display models, according to Macworld's Filipe Espósito. Espósito found the following codenames within macOS 26.3's source code, and he revealed the upcoming products that they likely correspond with, based on previous reporting from Bloomberg's Mark Gurman and others. The codenames:J700: Lower-cost MacBook J427:...
iphone 16 apple intelligence

Apple Aiming to Release 'Breakthrough' New iPhone Accessory

Wednesday February 18, 2026 12:43 pm PST by
Apple is looking for a "breakthrough" with its push into wearable AI devices, including an "AirTag-sized pendant," according to Bloomberg's Mark Gurman. In a report this week, he said the pendant is reminiscent of the failed Humane AI Pin, but it would be an iPhone accessory rather than a standalone product. The pendant would feature an "always-on" camera and a microphone for Siri voice...
Dynamic Island iPhone 18 Pro Feature

10 Reasons to Wait for Apple's iPhone 18 Pro

Wednesday February 18, 2026 5:12 am PST by
Apple's iPhone development roadmap runs several years into the future and the company is continually working with suppliers on several successive iPhone models at the same time, which is why we often get rumored features months ahead of launch. The iPhone 18 series is no different, and we already have a good idea of what to expect for the iPhone 18 Pro and iPhone 18 Pro Max. One thing worth...

Top Rated Comments

jchap Avatar
73 months ago
Despite all the sophisticated security measures a company might take, in the end it’s the human factor that brings it all down...
Score: 10 Votes (Like | Disagree)
JosephAW Avatar
73 months ago
My 80 yr old mother gets calls like this and she doesn't fall for it, what kind of training do they provide for their employees if any?
Score: 7 Votes (Like | Disagree)
AlexGraphicD Avatar
73 months ago
I call this BS. They’re trying to cover up for something else more insidious.
Score: 5 Votes (Like | Disagree)
Crowbot Avatar
73 months ago

Despite all the sophisticated security measures a company might take, in the end it’s the human factor that brings it all down...
Right. It's always been easier to convince someone to give you the key than figuring out how to make the key.
Score: 3 Votes (Like | Disagree)
ArPe Avatar
73 months ago

Was it just me or it is actually baffling to hear that their employees were victims of a phone spear phishing attack, which somehow gave the hackers access to Twitter's "internal tool"?

This is just bizarre.........
Bizarre that Twitter employees have an internal tool that gives them permission to post in your name on your Twitter accounts. What if Twitter decided to commandeer all those millions of fake or dormant accounts to manipulate or misinform the public?what if they already do this to some extent? And how much editorial power do they have to control what is allowed to ‘trend’ in a positive or negative light? Social engineering should be regulated otherwise it belongs to the highest bidders and advertisers. We’ve already seen how these platforms can be gamed with dark money to cause division and harm.
Score: 2 Votes (Like | Disagree)
73 months ago
Was it just me or it is actually baffling to hear that their employees were victims of a phone spear phishing attack, which somehow gave the hackers access to Twitter's "internal tool"?

This is just bizarre.........
Score: 2 Votes (Like | Disagree)