nypost.com Open in urlscan Pro
192.0.66.32  Public Scan

URL: https://nypost.com/2022/07/18/hackers-pose-as-twitter-employees-journalists-in-breach-tactics/
Submission: On August 08 via manual from PH — Scanned from DE

Form analysis 4 forms found in the DOM

https://nypost.com/

<form class="search__form" action="https://nypost.com/" id="nav-search">
  <div class="search__inner" role="search">
    <label for="search-input-interior" class="screen-reader-text"> Search </label>
    <input type="search" name="s" class="search__input" placeholder="Type to Search" value="">
  </div>
  <button class="search__submit" type="submit" id="search-submit" value="search" tabindex="-1" aria-label="Click to Search">
    <span class="search__submit-text"> Search </span>
    <span class="search__submit-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="23" height="24" viewBox="0 0 23 24" tabindex="-1" aria-hidden="true">
        <path data-name="Search Icon" d="M21.568 24l-7.348-7.344a9.218 9.218 0 111.54-1.325L23 22.569 21.569 24zM9.116 2.025a7.087 7.087 0 107.091 7.087 7.1 7.1 0 00-7.091-7.087z" fill="#C60800"></path>
      </svg>
    </span>
  </button>
</form>

<form class="search__form">
  <div class="search__inner" role="search">
    <label for="search-input-header" class="screen-reader-text"> Search </label>
    <span class="search__input-icon"><svg xmlns="http://www.w3.org/2000/svg" width="23" height="24" viewBox="0 0 23 24" tabindex="-1" aria-hidden="true">
        <path data-name="Search Icon" d="M21.568 24l-7.348-7.344a9.218 9.218 0 111.54-1.325L23 22.569 21.569 24zM9.116 2.025a7.087 7.087 0 107.091 7.087 7.1 7.1 0 00-7.091-7.087z" fill="#fff"></path>
      </svg>
    </span>
    <input type="search" name="s" class="search__input" id="search-input-header" placeholder="Type to Search" tabindex="-1" data-search-header="input">
  </div>
  <button class="search__submit" type="submit" tabindex="-1" aria-label="Click to Search" data-search-header="submit">
    <span class="search__submit-text">Search</span>
    <span class="search__submit-icon"><svg xmlns="http://www.w3.org/2000/svg" width="23" height="24" viewBox="0 0 23 24" tabindex="-1" aria-hidden="true">
        <path data-name="Search Icon" d="M21.568 24l-7.348-7.344a9.218 9.218 0 111.54-1.325L23 22.569 21.569 24zM9.116 2.025a7.087 7.087 0 107.091 7.087 7.1 7.1 0 00-7.091-7.087z" fill="#fff"></path>
      </svg>
    </span>
  </button>
</form>

POST https://nypost.com/2022/07/18/hackers-pose-as-twitter-employees-journalists-in-breach-tactics/#contact-form-23093963

<form action="https://nypost.com/2022/07/18/hackers-pose-as-twitter-employees-journalists-in-breach-tactics/#contact-form-23093963" method="post" class="contact-form commentsblock">
  <script>
    (function() {
      const contact_forms = document.getElementsByClassName('contact-form');
      for (const form of contact_forms) {
        form.onsubmit = function() {
          const buttons = form.getElementsByTagName('button');
          for (const button of buttons) {
            button.setAttribute('disabled', true);
          }
        }
      }
    })();
  </script>
  <div class="grunion-field-wrap grunion-field-name-wrap">
    <label for="g23093963-name" class="grunion-field-label name">Name<span>(required)</span></label>
    <input type="text" name="g23093963-name" id="g23093963-name" value="" class="name" required="" aria-required="true">
  </div>
  <div class="grunion-field-wrap grunion-field-email-wrap">
    <label for="g23093963-email" class="grunion-field-label email">Email<span>(required)</span></label>
    <input type="email" name="g23093963-email" id="g23093963-email" value="" class="email" required="" aria-required="true">
  </div>
  <div class="grunion-field-wrap grunion-field-textarea-wrap">
    <label for="contact-form-comment-g23093963-comment" class="grunion-field-label textarea">Comment<span>(required)</span></label>
    <textarea name="g23093963-comment" id="contact-form-comment-g23093963-comment" rows="20" class="textarea" required="" aria-required="true"></textarea>
  </div>
  <p class="contact-submit">
    <button type="submit" class="pushbutton-wide">Submit</button> <input type="hidden" name="contact-form-id" value="23093963">
    <input type="hidden" name="action" value="grunion-contact-form">
    <input type="hidden" name="contact-form-hash" value="281d0562854b6cb478f8c99042420a14ff58fc44">
  </p>
  <p style="display: none !important;"><label>Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_1" name="ak_js" value="1659947475847">
    <script>
      document.getElementById("ak_js_1").setAttribute("value", (new Date()).getTime());
    </script>
  </p>
</form>

POST /2022/07/18/hackers-pose-as-twitter-employees-journalists-in-breach-tactics/

<form action="/2022/07/18/hackers-pose-as-twitter-employees-journalists-in-breach-tactics/" method="post">
  <label for="target_email">Send to Email Address</label>
  <input type="email" name="target_email" id="target_email" value="">
  <label for="source_name">Your Name</label>
  <input type="text" name="source_name" id="source_name" value="">
  <label for="source_email">Your Email Address</label>
  <input type="email" name="source_email" id="source_email" value="">
  <input type="text" id="jetpack-source_f_name" name="source_f_name" class="input" value="" size="25" autocomplete="off" title="This field is for validation and should not be changed">
  <img style="float: right; display: none" class="loading" src="https://nypost.com/wp-content/mu-plugins/jetpack-10.9/modules/sharedaddy/images/loading.gif" alt="loading" width="16" height="16">
  <input type="submit" value="Send Email" class="sharing_send">
  <a rel="nofollow" href="#cancel" class="sharing_cancel" role="button">Cancel</a>
  <div class="errors errors-1" style="display: none;"> Post was not sent - check your email addresses! </div>
  <div class="errors errors-2" style="display: none;"> Email check failed, please try again </div>
  <div class="errors errors-3" style="display: none;"> Sorry, your blog cannot share posts by email. </div>
</form>

Text Content

Primary Menu Sections
Search
Search
Skip to search results
 * News
 * Metro
 * Page Six
 * Sports
 * Post Sports+
 * Sports Betting
 * Business
 * Opinion
 * Entertainment
 * Fashion
 * Shopping
 * Living
 * Media
 * Tech
 * Real Estate
 * Astrology
 * Video
 * Photos
 * Visual Stories
 * Sub Menu 1
   * Covers
   * Columnists
   * Horoscopes
   * Sports Odds
   * Podcasts
   * Careers
 * Sub menu 2
   * Email Newsletters
   * Official Store
   * Home Delivery
   * Tips

Log In
Search Email
New York Post
New!
Sports Plus!
Get 30 Days Free


August 8, 2022
Search
Search




Tech
 * Facebook
 * Twitter
 * Flipboard
 * WhatsApp
 * Email
 * Copy
 * 
 * Comments


HACKERS POSE AS TWITTER EMPLOYEES, JOURNALISTS IN NEW BREACH TACTICS

By
Theo Wayt


SOCIAL LINKS FOR THEO WAYT

 * View Author Archive
 * email the author
 * Get author RSS feed


CONTACT THE AUTHOR

Name(required)
Email(required)
Comment(required)

Submit

Δ

Thanks for contacting us. We've received your submission.

Back to Reading
July 18, 2022 10:14am
Updated
July 18, 2022 10:14am
Hackers are impersonating Twitter employees and journalists. Getty Images


MORE ON: HACKING


 * TAIWAN PRESIDENTIAL OFFICE SITE HIT WITH CYBERATTACK AS PELOSI VISIT LOOMS


 * HONDA KEY FOB HACK COULD LEAVE ALL VEHICLE MODELS SINCE 2012 VULNERABLE:
   REPORTS


 * APPLE TO RELEASE IPHONE ‘LOCKDOWN MODE’ TO HELP BATTLE HACKERS


 * CHINA CENSORS ALLEGED DATA LEAK OF 1 BILLION RESIDENTS: REPORT

Hackers from China, Iran and Turkey are using new tactics including posing as
Twitter employees and journalists in their latest attempts to breach victims’
devices, according to a new cybersecurity study. 

The report shows how governments around the world are responding to increased
political tension by ramping up unconventional hacking campaigns.

In one example, hackers from Turkey created fake messages from Twitter in an
effort to hijack users’ accounts, according to the study from security software
company Proofpoint. 

The messages notified victims that their accounts had seen a “New Login” in
Moscow, Russia and urged them to click a link to change their passwords. Users
who clicked the link and entered their account information would then have their
accounts taken over by the hackers. 

The Turkish hackers have primarily targeted journalists with this technique in
an effort to steal their social media accounts, according to the study. 

An example of a fake Twitter email that Proofpoint says was sent out by Turkish
hackers.

In another tactic, Iranian hackers are creating “reporter personas” in efforts
to breach the email accounts of academics and Middle East policy experts. 

“My name is Amy Duncan and I’m a senior reporter with Metro newspaper,” reads
one such email that was sent to an academic who specializes in Iran. “I would be
most grateful if I could have an interview with you.” 

The fake reporter then sent multiple follow-up emails, including a video call
invitation with a link that redirects to a password-harvesting website. 

Iranian hackers are impersonating journalists, according to Proofpoint.

Iranian hackers have also posted as journalists from Fox News, The Guardian and
UK news site iNews, according to Proofpoint. 

Other recent hacking campaigns have focused on breaching the accounts of
journalists themselves. 


SEE ALSO


NEWS CORP BREACHED BY HACKERS WITH APPARENT CHINA LINK

After the Capitol riots in January 2021, Chinese hackers blanketed White House
correspondents and other US politics reporters with phishing emails in attempts
to breach their accounts. Later that year, they shifted their focus to reporters
covering cybersecurity, surveillance and privacy issues — especially those who
write about China, according to Proofpoint. 

Ahead of Russia’s invasion of Ukraine, the Chinese hackers shifted their focus
to journalists covering US and European national security, according to the
report. 

Employees of the New York Post and Wall Street Journal were targeted in an
apparent Chinese intelligence-gathering operation, parent company News Corp said
in February.

North Korean hackers have likewise targeted US journalists using fake job
listings, the report says. 

What do you think? Post a comment.

“From intentions to gather sensitive information to attempts to manipulate
public perceptions, the knowledge and access that a journalist or news outlet
can provide is unique in the public space,” Proofpoint’s researchers wrote.
“Targeting the media sector also lowers the risk of failure or discovery to a
[hacker] than going after other, more hardened targets of interest, such as
government entities.”


SHARE THIS ARTICLE:

 * Facebook
 * Twitter
 * Flipboard
 * WhatsApp
 * Email
 * Copy
 * 
 * Comments

Filed under
 * china
 * hack
 * hackers
 * hacking
 * iran
 * turkey
 * 7/18/22

Read Next How Elon Musk entrusted $5.7 billion to a Russian pothead ...


Skip
Ads by


TRENDING NOW ON NYPOST.COM

 * This story has been shared 29,720 times. 29,720
   
   
   'VERY BAD DAY': ANNE HECHE DOWNED VODKA, WINE IN PODCAST POSTED HOURS BEFORE
   CRASH

 * This story has been shared 25,979 times. 25,979
   
   
   DAD INVENTS FLAMETHROWER FOR KIDS TO PLAY WITH AT HOME: 'BEST TOY EVER'

 * This story has been shared 24,040 times. 24,040
   
   
   DAD OF 2 WHO LEAPT TO HIS DEATH FROM BRONX BUILDING WITH WIFE WAS AN ACTOR
   FROM ALBANIA





NOW ON PAGE SIX




 * MELISSA AND JOE GORGA RETURN HOME AFTER SKIPPING TERESA GIUDICE’S WEDDING FOR
   THE BEACH


 * SHAWN MENDES SMILES, FLEXES MUSCLES IN MIAMI BEACH AFTER CANCELING TOUR


 * ALL THE ‘HOUSEWIVES’ AT TERESA GIUDICE AND LOUIS RUELAS’ WEDDING

See All


VIDEO


 * VIDEO CATCHES TEENS CRASH STOLEN KIA, TAKE OFF RUNNING ON HIGHWAY




NOW ON DECIDER




 * BILL MAHER SAYS UFOS ARE CASING NAVY PILOTS TO ATTACK ON ‘REAL TIME’

See All

WHAT TO SHOP


 * MASTERCLASS VS. SKILLSHARE: PROS, CONS & THE 35 COURSES I REVIEWED


 * GET YOUR YARD READY FOR FALL WITH THESE 15 PRODUCTS FOR SALE ON AMAZON


 * 15 BEST AIR CONDITIONERS OF 2022 TO KEEP YOUR HOME COOL FOR THE HEATWAVE, PER
   REVIEWS


 * OUT WITH THE OLD AND IN WITH THE 22 NEW AUGUST PRODUCT LAUNCHES


 * ULTA FOREVER FABULOUS SALE 2022: 8 BEST DEALS ON CELEB-LOVED BEAUTY PRODUCTS




Share Selection

 * Share selection to Facebook
 * Share selection to Twitter


MORE STORIES


PAGE SIX

INSIDE TERESA GIUDICE AND LUIS RUELAS' EXTRAVAGANT WEDDING




NYPOST

'VERY BAD DAY': ANNE HECHE DOWNED VODKA, WINE IN PODCAST POSTED HOURS BEFORE
CRASH

 * Facebook
 * Twitter
 * Instagram
 * LinkedIn
 * Email
 * YouTube

 * Sections & Features
   * News
   * Metro
   * Sports
   * Sports Betting
   * Business
   * Opinion
   * Entertainment
   * Fashion
   * Shopping
   * Living
   * Media
   * Tech
   * Real Estate
   * Astrology
   * Video
   * Photos
   * Visual Stories
   * Alexa
   * Covers
   * Horoscopes
   * Sports Odds
   * Podcasts
   * Columnists
   * Classifieds
 * Post Sports+
   * Subscribe
   * Articles
   * Manage
 * Newsletters & Feeds
   * Email Newsletters
   * RSS Feeds
   * NY Post Official Store
   * Home Delivery
     * Subscribe
     * Manage Subscription
   * Delivery Help
 * Help/Support
   * About New York Post
   * Customer Service
   * App FAQ & Help
   * Community Guidelines
   * Contact Us
     * Tips
     * Newsroom
     * Letters to the Editor
     * Reprints
     * Careers
 * Apps
   * iPhone App
   * iPad App
   * Android Phone
   * Android Tablet
   * Advertise
     * Self Service
     * Media Kit
     * Contact

© 2022 NYP Holdings, Inc. All Rights Reserved Terms of Use Membership Terms
Privacy Notice Your Ad Choices Sitemap Your California Privacy Rights Manage
Choices


SHARE LINK

click to copy




Send to Email Address Your Name Your Email Address Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.

Notifications





ABOUT YOUR PRIVACY




 * YOUR PRIVACY


 * STRICTLY NECESSARY COOKIES


 * FUNCTIONAL COOKIES


 * ANALYTICS COOKIES


 * TARGETING COOKIES


 * STORE AND/OR ACCESS INFORMATION ON A DEVICE


 * CREATE A PERSONALISED ADS PROFILE


 * SELECT PERSONALISED ADS


 * CREATE A PERSONALISED CONTENT PROFILE


 * SELECT PERSONALISED CONTENT


 * SELECT BASIC ADS


 * MEASURE AD PERFORMANCE


 * MEASURE CONTENT PERFORMANCE


 * APPLY MARKET RESEARCH TO GENERATE AUDIENCE INSIGHTS


 * DEVELOP AND IMPROVE PRODUCTS


 * USE PRECISE GEOLOCATION DATA


 * SPECIAL PURPOSES


 * FEATURES


 * DO NOT USE

YOUR PRIVACY

We process your data to deliver content or advertisements and measure the
delivery of such content or advertisements to extract insights about our
website. We share this information with our partners on the basis of consent and
legitimate interest. You may exercise your right to consent or object to a
legitimate interest, based on a specific purpose below or at a partner level in
the link under each purpose. These choices will be signaled to our vendors
participating in the Transparency and Consent Framework.
More information about your privacy

List of Vendors‎

STRICTLY NECESSARY COOKIES

Always Active

Strictly necessary cookies are essential for the website to function correctly.
These cookies may also be used to assist in fraud prevention and security. You
can set your browser to block or alert you about these cookies, but without
them, performance of the site may be affected and you may not be able to take
full advantage of all services and/or features of the site.

FUNCTIONAL COOKIES

Functional Cookies No Consent


Functional cookies collect information regarding your choices and preferences
(such as, your language preference, user name, or location) to provide a more
personalized online experience and show you content relevant to where you are,
such as customizing a certain webpage or remembering if we have asked you to
sign up for our Services. With mobile or other internet enabled devices,
functional cookies may collect a unique identifier assigned to an internet
enabled device (mobile, tablet), geolocation data or other traffic information
for that device. These features help us improve your experience with the
website, for example, to determine the appropriate device location during a
session or count articles viewed.

ANALYTICS COOKIES

Analytics Cookies No Consent


We and our service providers, such as Google Analytics, use analytics cookies to
collect information about your use of the website to help create reports and
statistics on the performance of the website, which enable us to improve the way
the site works. Analytics cookies collect information such as your IP address,
type of device, operating system, referring URLs, country information data and
time of page visits, and pages visited. This information allows us to identify
overall patterns of usage on the website, and help us record any difficulties
you have with website.

TARGETING COOKIES

Targeting Cookies No Consent


These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

STORE AND/OR ACCESS INFORMATION ON A DEVICE

Store and/or access information on a device No Consent


Cookies, device identifiers, or other information can be stored or accessed on
your device for the purposes presented to you.

List of Vendors‎ | View Full Legal Text Opens in a new Tab

CREATE A PERSONALISED ADS PROFILE

Create a personalised ads profile No Consent


A profile can be built about you and your interests to show you personalised ads
that are relevant to you.

List of Vendors‎ | View Full Legal Text Opens in a new Tab

SELECT PERSONALISED ADS

Select personalised ads No Consent


Personalised ads can be shown to you based on a profile about you.

List of Vendors‎ | View Full Legal Text Opens in a new Tab

CREATE A PERSONALISED CONTENT PROFILE

Create a personalised content profile No Consent


A profile can be built about you and your interests to show you personalised
content that is relevant to you.

List of Vendors‎ | View Full Legal Text Opens in a new Tab

SELECT PERSONALISED CONTENT

Select personalised content No Consent


Personalised content can be shown to you based on a profile about you.

List of Vendors‎ | View Full Legal Text Opens in a new Tab

SELECT BASIC ADS



Ads can be shown to you based on the content you’re viewing, the app you’re
using, your approximate location, or your device type.

Object to Legitimate Interests Remove Objection
List of Vendors‎ | View Full Legal Text Opens in a new Tab

MEASURE AD PERFORMANCE



The performance and effectiveness of ads that you see or interact with can be
measured.

Object to Legitimate Interests Remove Objection
List of Vendors‎ | View Full Legal Text Opens in a new Tab

MEASURE CONTENT PERFORMANCE



The performance and effectiveness of content that you see or interact with can
be measured.

Object to Legitimate Interests Remove Objection
List of Vendors‎ | View Full Legal Text Opens in a new Tab

APPLY MARKET RESEARCH TO GENERATE AUDIENCE INSIGHTS



Market research can be used to learn more about the audiences who visit
sites/apps and view ads.

Object to Legitimate Interests Remove Objection
List of Vendors‎ | View Full Legal Text Opens in a new Tab

DEVELOP AND IMPROVE PRODUCTS



Your data can be used to improve existing systems and software, and to develop
new products

Object to Legitimate Interests Remove Objection
List of Vendors‎ | View Full Legal Text Opens in a new Tab

USE PRECISE GEOLOCATION DATA

Use precise geolocation data No Consent


Your precise geolocation data can be used in support of one or more purposes.
This means your location can be accurate to within several meters.

List of Vendors‎ | View Full Legal Text Opens in a new Tab

SPECIAL PURPOSES

Always Active

We have a need to use your data for this processing purpose that is required for
us to deliver services to you.

 * TECHNICALLY DELIVER ADS OR CONTENT
   
   Switch Label label
   
   Your device can receive and send information that allows you to see and
   interact with ads and content.

 * ENSURE SECURITY, PREVENT FRAUD, AND DEBUG
   
   Switch Label label
   
   Your data can be used to monitor for and prevent fraudulent activity, and
   ensure systems and processes work properly and securely.

List of Vendors‎ | View Full Legal Text Opens in a new Tab

FEATURES

Always Active

Features are a use of the data that you have already agreed to share with us.

 * MATCH AND COMBINE OFFLINE DATA SOURCES
   
   Switch Label label
   
   Data from offline data sources can be combined with your online activity in
   support of one or more purposes

 * LINK DIFFERENT DEVICES
   
   Switch Label label
   
   Different devices can be determined as belonging to you or your household in
   support of one or more of purposes.

 * RECEIVE AND USE AUTOMATICALLY-SENT DEVICE CHARACTERISTICS FOR IDENTIFICATION
   
   Switch Label label
   
   Your device might be distinguished from other devices based on information it
   automatically sends, such as IP address or browser type.

List of Vendors‎ | View Full Legal Text Opens in a new Tab

DO NOT USE

Do Not Use No Consent




Back Button


BACK



Vendor Search
Filter Button
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Clear
checkbox label label
Apply Cancel
Confirm My Choices
Reject All Allow All



WE VALUE YOUR PRIVACY

We and our partners store and access information on your device, such as unique
IDs in cookies to process personal data. You may accept and manage your choices
at any time by clicking `Manage Choices`, including your right to object where
legitimate interest is relied upon. Your choices will be signaled to our
partners and will not affect your browsing.Cookie Notice


WE AND OUR PARTNERS PROCESS DATA FOR THE FOLLOWING REASONS:

Use precise geolocation data. Actively scan device characteristics for
identification. Store and/or access information on a device. Create a
personalised ads profile. Select personalised ads. Create a personalised content
profile. Select personalised content. Select basic ads. Measure ad performance.
Measure content performance. Apply market research to generate audience
insights. Develop and improve products. List of Partners (vendors)

Allow All Manage Choices