Skip to main content
The Globe and Mail
Support Quality Journalism
The Globe and Mail
First Access to Latest
Investment News
Collection of curated
e-books and guides
Inform your decisions via
Globe Investor Tools
Just$1.99
per week
for first 24 weeks

Enjoy unlimited digital access
Enjoy Unlimited Digital Access
Get full access to globeandmail.com
Just $1.99 per week for the first 24 weeks
Just $1.99 per week for the first 24 weeks
var select={root:".js-sub-pencil",control:".js-sub-pencil-control",open:"o-sub-pencil--open",closed:"o-sub-pencil--closed"},dom={},allowExpand=!0;function pencilInit(o){var e=arguments.length>1&&void 0!==arguments[1]&&arguments[1];select.root=o,dom.root=document.querySelector(select.root),dom.root&&(dom.control=document.querySelector(select.control),dom.control.addEventListener("click",onToggleClicked),setPanelState(e),window.addEventListener("scroll",onWindowScroll),dom.root.removeAttribute("hidden"))}function isPanelOpen(){return dom.root.classList.contains(select.open)}function setPanelState(o){dom.root.classList[o?"add":"remove"](select.open),dom.root.classList[o?"remove":"add"](select.closed),dom.control.setAttribute("aria-expanded",o)}function onToggleClicked(){var l=!isPanelOpen();setPanelState(l)}function onWindowScroll(){window.requestAnimationFrame(function() {var l=isPanelOpen(),n=0===(document.body.scrollTop||document.documentElement.scrollTop);n||l||!allowExpand?n&&l&&(allowExpand=!0,setPanelState(!1)):(allowExpand=!1,setPanelState(!0))});}pencilInit(".js-sub-pencil",!1); // via darwin-bg var slideIndex = 0; carousel(); function carousel() { var i; var x = document.getElementsByClassName("subs_valueprop"); for (i = 0; i < x.length; i++) { x[i].style.display = "none"; } slideIndex++; if (slideIndex> x.length) { slideIndex = 1; } x[slideIndex - 1].style.display = "block"; setTimeout(carousel, 2500); }

The Federal Bureau of Investigation’s San Francisco division is leading an inquiry into the Twitter hacking, it said in a statement, as more Washington lawmakers called for an accounting of how it happened.

The law enforcement agency said hackers committed cryptocurrency fraud after they seized control of the Twitter accounts of celebrities and political figures including Joe Biden, Kim Kardashian, Barack Obama and Elon Musk.

A day after the breach, it was not clear if the hackers were able to see private messages sent by account holders, although Twitter said it had no evidence that attackers had been able to access passwords.

Story continues below advertisement

The company said in a statement that it was continuing to lock accounts that had changed passwords in the past month, but said “we believe only a small subset of these locked accounts were compromised.”

Twitter had stepped up its search for a chief information security officer in recent weeks, two people familiar with the effort told Reuters, before the breach of high-profile accounts on Wednesday raised alarms about the platform’s security. Twitter declined to comment on the job search.

In a sign of how much the attacked unnerved U.S. lawmakers, both Democrats and Republicans showed rare bipartisan agreement that Twitter must better explain how the security lapse happened and what it was doing to prevent future attacks.

“This hack bodes ill for November balloting,” U.S. Senator Richard Blumenthal, a Democrat, said in a statement scolding Twitter for “its repeated security lapses and failure to safeguard accounts.”

Echoing a similar sentiment, Representative Jim Jordan, the top Republican on the House Judiciary Committee, asked what would happen if Twitter allowed a similar incident to occur on Nov. 2, a day before the U.S. presidential election.

Mr. Jordan said he remained locked out of his Twitter account as of Thursday afternoon.

President Donald Trump, a prolific Twitter user, was planning to continue tweeting and his account was not jeopardized during the attack, spokeswoman Kayleigh McEnany said.

Story continues below advertisement

The White House had been in “constant contact with Twitter over the last 18 hours” to keep Mr. Trump’s Twitter feed secure, she said.

Twitter said hackers had targeted employees with access to its internal systems and “used this access to take control of many highly-visible [including verified] accounts.”

Other high-profile accounts that were hacked included rapper Kanye West, Amazon.com Inc. founder Jeff Bezos, investor Warren Buffett, Microsoft Corp. co-founder Bill Gates, and the corporate accounts for Uber Technologies Inc. and Apple Inc.

The company, which has been without a security chief since December, said the hackers conducted a “coordinated social engineering attack” against its employees.

Some security experts who have been studying the hack from outside believe there could be multiple actors involved.

Their theory is that access to the employee tool, which should have been more closely monitored, spread among people interested in prestige accounts for bragging rights or money. It could have spread further, to spies or pranksters.

Story continues below advertisement

In an extraordinary step, Twitter temporarily prevented many verified accounts from publishing messages as it investigated the breach.

The hijacked accounts tweeted out messages telling users to send bitcoin. Publicly available blockchain records show the apparent scammers received more than US$100,000 worth of cryptocurrency.

As of Thursday, Twitter was continuing to block tweets containing the bitcoin addresses the scammers had used. Facebook Inc. appeared to have enabled a similar security feature on its Messenger service temporarily on Wednesday, but did not respond to queries on whether it had also been targeted in the attack.

Twitter’s shares fell a little more than 1 per cent on Thursday.

CEO Jack Dorsey said on Wednesday that it was a “tough day” for everyone at Twitter and pledged to share “everything we can when we have a more complete understanding of exactly what happened.”

Mr. Dorsey’s assurances did not assuage Washington’s concerns about social-media companies, whose policies have come under scrutiny by critics on both the left and the right.

Story continues below advertisement

Frank Pallone, a Democrat who chairs the House Energy and Commerce Committee that oversees a sizable portion of U.S. tech policy, said the company needed to explain how the hack took place.

The U.S. House Intelligence Committee was in touch with Twitter regarding the hack, according to a committee official who did not wish to be named.

Be smart with your money. Get the latest investing insights delivered right to your inbox three times a week, with the Globe Investor newsletter. Sign up today.

Report an error
Tickers mentioned in this story
Due to technical reasons, we have temporarily removed commenting from our articles. We hope to have this fixed soon. Thank you for your patience. If you are looking to give feedback on our new site, please send it along to feedback@globeandmail.com. If you want to write a letter to the editor, please forward to letters@globeandmail.com.

Welcome to The Globe and Mail’s comment community. This is a space where subscribers can engage with each other and Globe staff. Non-subscribers can read and sort comments but will not be able to engage with them in any way. Click here to subscribe.

If you would like to write a letter to the editor, please forward it to letters@globeandmail.com. Readers can also interact with The Globe on Facebook and Twitter .

Welcome to The Globe and Mail’s comment community. This is a space where subscribers can engage with each other and Globe staff. Non-subscribers can read and sort comments but will not be able to engage with them in any way. Click here to subscribe.

If you would like to write a letter to the editor, please forward it to letters@globeandmail.com. Readers can also interact with The Globe on Facebook and Twitter .

Welcome to The Globe and Mail’s comment community. This is a space where subscribers can engage with each other and Globe staff.

We aim to create a safe and valuable space for discussion and debate. That means:

  • Treat others as you wish to be treated
  • Criticize ideas, not people
  • Stay on topic
  • Avoid the use of toxic and offensive language
  • Flag bad behaviour

Comments that violate our community guidelines will be removed.

Read our community guidelines here

Discussion loading ...

To view this site properly, enable cookies in your browser. Read our privacy policy to learn more.
How to enable cookies