<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cloudhopper &#8211; EFR Technology Group</title>
	<atom:link href="https://www.efrtechgroup.com/category/cloudhopper/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.efrtechgroup.com</link>
	<description>We maintain technology so you don't have to!</description>
	<lastBuildDate>Fri, 30 Aug 2019 20:10:00 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.efrtechgroup.com/wp-content/uploads/2019/02/cropped-EFRTG-color-2-32x32.jpg</url>
	<title>cloudhopper &#8211; EFR Technology Group</title>
	<link>https://www.efrtechgroup.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Twitter CEO Jack Dorsey&#8217;s account has been compromised, again</title>
		<link>https://www.efrtechgroup.com/tech/twitter-ceo-jack-dorseys-account-has-been-compromised-again/</link>
		
		<dc:creator><![CDATA[Randall]]></dc:creator>
		<pubDate>Fri, 30 Aug 2019 20:10:00 +0000</pubDate>
				<category><![CDATA[cloudhopper]]></category>
		<category><![CDATA[Entertainment]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[jack dorsey]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[services]]></category>
		<category><![CDATA[sms]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Twitter]]></category>
		<guid isPermaLink="false">https://www.efrtechgroup.com/twitter-ceo-jack-dorseys-account-has-been-compromised-again/</guid>

					<description><![CDATA[[ad_1] Securing accounts online can be difficult, especially when you&#8217;ve got a lot of legacy access points laying around. Today&#8217;s example is Twitter CEO Jack Dorsey, whose Twitter account has suddenly been hijacked to send random messages and racial slurs. A quick look at the messages (which are quickly being deleted) identifies their source as [&#8230;]]]></description>
										<content:encoded><![CDATA[<p> [ad_1]<br />
</p>
<div>
<p>Securing accounts online can be difficult, especially when you&#8217;ve got a lot of legacy access points laying around. Today&#8217;s example is Twitter CEO Jack Dorsey, whose Twitter account has suddenly been hijacked to send random messages and racial slurs. A quick look at the messages (which are quickly being deleted) identifies their source as Cloudhopper, <a href="https://techcrunch.com/2010/04/23/twitter-buys-cloudhopper-to-bolster-its-sms-service/">an SMS service Twitter acquired back in 2010</a>.</p>
<p>While newer users may not remember this period, but there was a time <a href="https://help.twitter.com/en/using-twitter/create-twitter-account-mobile">when SMS was the main way</a> to use Twitter, and some have noted that Dorsey was still posting using text messages <a href="https://twitter.com/Robbie/status/1091503724793540608">as recently as this year</a>. Twitter announced that it is aware the account has been compromised and is investigating. <a href="https://twitter.com/rjcc/status/1167535938916028418">I confirmed on my own account</a> that texting 40404 from my registered number still works, and identifies the tweet&#8217;s source app as Cloudfront. With no option for other protections, tweeting from Dorsey&#8217;s account (or anyone else&#8217;s) is just as easy as <a href="https://www.engadget.com/2019/06/28/cell-phone-hack-is-ruining-lives-identity-theft/">pulling off the increasingly common SIM hijack to steal their phone number</a>.</p>
<p>This isn&#8217;t the first time someone&#8217;s used a backdoor to send messages from Dorsey&#8217;s account, however. In 2016, the group calling itself <a href="https://www.engadget.com/2016/07/11/twitter-remains-quiet-about-ourmine-attack-on-its-ceos-account/">&#8220;OurMine&#8221; hijacked a number of high-profile accounts, including @Jack</a>, and alleged that Vine stored passwords insecurely.</p>
<p><strong>Update</strong>: Twitter has <a href="https://twitter.com/TwitterComms/status/1167548246618587137">confirmed</a> that Dorsey&#8217;s account is again secure, and without explaining how the exploit worked, said &#8220;there is no indication that Twitter&#8217;s systems have been compromised.&#8221; That would be consistent with someone swapping the CEO&#8217;s SIM or somehow spoofing the number, neither of which would require actually compromising Twitter or accessing his account directly.</p>
<p><strong>Update 2 (8:27 PM ET):</strong> Twitter <a href="https://twitter.com/TwitterComms/status/1167591003143847936">explained what happened</a> and it was as I suspected, &#8220;The phone number associated with the account was compromised due to a security oversight by the mobile provider. This allowed an unauthorized person to compose and send tweets via text message from the phone number.&#8221; Journalist Brian Krebs <a href="https://twitter.com/briankrebs/status/1167581370048307206">recommended</a> using a Google Voice phone number to register online accounts, since that can be secured with 2FA and hardware keys, which mobile carriers don&#8217;t support.</p>
</p></div>
<p><script async src="http://platform.twitter.com/widgets.js" charset="utf-8"></script><br />
<br />[ad_2]<br />
<br /><a href="https://www.engadget.com/2019/08/30/jack-dorsey-twitter-hack-sms/">Source link </a></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
