nypost.com
Open in
urlscan Pro
192.0.66.32
Public Scan
URL:
https://nypost.com/2022/07/18/hackers-pose-as-twitter-employees-journalists-in-breach-tactics/
Submission: On August 08 via manual from PH — Scanned from DE
Submission: On August 08 via manual from PH — Scanned from DE
Form analysis
4 forms found in the DOMhttps://nypost.com/
<form class="search__form" action="https://nypost.com/" id="nav-search">
<div class="search__inner" role="search">
<label for="search-input-interior" class="screen-reader-text"> Search </label>
<input type="search" name="s" class="search__input" placeholder="Type to Search" value="">
</div>
<button class="search__submit" type="submit" id="search-submit" value="search" tabindex="-1" aria-label="Click to Search">
<span class="search__submit-text"> Search </span>
<span class="search__submit-icon">
<svg xmlns="http://www.w3.org/2000/svg" width="23" height="24" viewBox="0 0 23 24" tabindex="-1" aria-hidden="true">
<path data-name="Search Icon" d="M21.568 24l-7.348-7.344a9.218 9.218 0 111.54-1.325L23 22.569 21.569 24zM9.116 2.025a7.087 7.087 0 107.091 7.087 7.1 7.1 0 00-7.091-7.087z" fill="#C60800"></path>
</svg>
</span>
</button>
</form>
<form class="search__form">
<div class="search__inner" role="search">
<label for="search-input-header" class="screen-reader-text"> Search </label>
<span class="search__input-icon"><svg xmlns="http://www.w3.org/2000/svg" width="23" height="24" viewBox="0 0 23 24" tabindex="-1" aria-hidden="true">
<path data-name="Search Icon" d="M21.568 24l-7.348-7.344a9.218 9.218 0 111.54-1.325L23 22.569 21.569 24zM9.116 2.025a7.087 7.087 0 107.091 7.087 7.1 7.1 0 00-7.091-7.087z" fill="#fff"></path>
</svg>
</span>
<input type="search" name="s" class="search__input" id="search-input-header" placeholder="Type to Search" tabindex="-1" data-search-header="input">
</div>
<button class="search__submit" type="submit" tabindex="-1" aria-label="Click to Search" data-search-header="submit">
<span class="search__submit-text">Search</span>
<span class="search__submit-icon"><svg xmlns="http://www.w3.org/2000/svg" width="23" height="24" viewBox="0 0 23 24" tabindex="-1" aria-hidden="true">
<path data-name="Search Icon" d="M21.568 24l-7.348-7.344a9.218 9.218 0 111.54-1.325L23 22.569 21.569 24zM9.116 2.025a7.087 7.087 0 107.091 7.087 7.1 7.1 0 00-7.091-7.087z" fill="#fff"></path>
</svg>
</span>
</button>
</form>
POST https://nypost.com/2022/07/18/hackers-pose-as-twitter-employees-journalists-in-breach-tactics/#contact-form-23093963
<form action="https://nypost.com/2022/07/18/hackers-pose-as-twitter-employees-journalists-in-breach-tactics/#contact-form-23093963" method="post" class="contact-form commentsblock">
<script>
(function() {
const contact_forms = document.getElementsByClassName('contact-form');
for (const form of contact_forms) {
form.onsubmit = function() {
const buttons = form.getElementsByTagName('button');
for (const button of buttons) {
button.setAttribute('disabled', true);
}
}
}
})();
</script>
<div class="grunion-field-wrap grunion-field-name-wrap">
<label for="g23093963-name" class="grunion-field-label name">Name<span>(required)</span></label>
<input type="text" name="g23093963-name" id="g23093963-name" value="" class="name" required="" aria-required="true">
</div>
<div class="grunion-field-wrap grunion-field-email-wrap">
<label for="g23093963-email" class="grunion-field-label email">Email<span>(required)</span></label>
<input type="email" name="g23093963-email" id="g23093963-email" value="" class="email" required="" aria-required="true">
</div>
<div class="grunion-field-wrap grunion-field-textarea-wrap">
<label for="contact-form-comment-g23093963-comment" class="grunion-field-label textarea">Comment<span>(required)</span></label>
<textarea name="g23093963-comment" id="contact-form-comment-g23093963-comment" rows="20" class="textarea" required="" aria-required="true"></textarea>
</div>
<p class="contact-submit">
<button type="submit" class="pushbutton-wide">Submit</button> <input type="hidden" name="contact-form-id" value="23093963">
<input type="hidden" name="action" value="grunion-contact-form">
<input type="hidden" name="contact-form-hash" value="281d0562854b6cb478f8c99042420a14ff58fc44">
</p>
<p style="display: none !important;"><label>Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_1" name="ak_js" value="1659947475847">
<script>
document.getElementById("ak_js_1").setAttribute("value", (new Date()).getTime());
</script>
</p>
</form>
POST /2022/07/18/hackers-pose-as-twitter-employees-journalists-in-breach-tactics/
<form action="/2022/07/18/hackers-pose-as-twitter-employees-journalists-in-breach-tactics/" method="post">
<label for="target_email">Send to Email Address</label>
<input type="email" name="target_email" id="target_email" value="">
<label for="source_name">Your Name</label>
<input type="text" name="source_name" id="source_name" value="">
<label for="source_email">Your Email Address</label>
<input type="email" name="source_email" id="source_email" value="">
<input type="text" id="jetpack-source_f_name" name="source_f_name" class="input" value="" size="25" autocomplete="off" title="This field is for validation and should not be changed">
<img style="float: right; display: none" class="loading" src="https://nypost.com/wp-content/mu-plugins/jetpack-10.9/modules/sharedaddy/images/loading.gif" alt="loading" width="16" height="16">
<input type="submit" value="Send Email" class="sharing_send">
<a rel="nofollow" href="#cancel" class="sharing_cancel" role="button">Cancel</a>
<div class="errors errors-1" style="display: none;"> Post was not sent - check your email addresses! </div>
<div class="errors errors-2" style="display: none;"> Email check failed, please try again </div>
<div class="errors errors-3" style="display: none;"> Sorry, your blog cannot share posts by email. </div>
</form>
Text Content
Primary Menu Sections Search Search Skip to search results * News * Metro * Page Six * Sports * Post Sports+ * Sports Betting * Business * Opinion * Entertainment * Fashion * Shopping * Living * Media * Tech * Real Estate * Astrology * Video * Photos * Visual Stories * Sub Menu 1 * Covers * Columnists * Horoscopes * Sports Odds * Podcasts * Careers * Sub menu 2 * Email Newsletters * Official Store * Home Delivery * Tips Log In Search Email New York Post New! Sports Plus! Get 30 Days Free August 8, 2022 Search Search Tech * Facebook * Twitter * Flipboard * WhatsApp * Email * Copy * * Comments HACKERS POSE AS TWITTER EMPLOYEES, JOURNALISTS IN NEW BREACH TACTICS By Theo Wayt SOCIAL LINKS FOR THEO WAYT * View Author Archive * email the author * Get author RSS feed CONTACT THE AUTHOR Name(required) Email(required) Comment(required) Submit Δ Thanks for contacting us. We've received your submission. Back to Reading July 18, 2022 10:14am Updated July 18, 2022 10:14am Hackers are impersonating Twitter employees and journalists. Getty Images MORE ON: HACKING * TAIWAN PRESIDENTIAL OFFICE SITE HIT WITH CYBERATTACK AS PELOSI VISIT LOOMS * HONDA KEY FOB HACK COULD LEAVE ALL VEHICLE MODELS SINCE 2012 VULNERABLE: REPORTS * APPLE TO RELEASE IPHONE ‘LOCKDOWN MODE’ TO HELP BATTLE HACKERS * CHINA CENSORS ALLEGED DATA LEAK OF 1 BILLION RESIDENTS: REPORT Hackers from China, Iran and Turkey are using new tactics including posing as Twitter employees and journalists in their latest attempts to breach victims’ devices, according to a new cybersecurity study. The report shows how governments around the world are responding to increased political tension by ramping up unconventional hacking campaigns. In one example, hackers from Turkey created fake messages from Twitter in an effort to hijack users’ accounts, according to the study from security software company Proofpoint. The messages notified victims that their accounts had seen a “New Login” in Moscow, Russia and urged them to click a link to change their passwords. Users who clicked the link and entered their account information would then have their accounts taken over by the hackers. The Turkish hackers have primarily targeted journalists with this technique in an effort to steal their social media accounts, according to the study. An example of a fake Twitter email that Proofpoint says was sent out by Turkish hackers. In another tactic, Iranian hackers are creating “reporter personas” in efforts to breach the email accounts of academics and Middle East policy experts. “My name is Amy Duncan and I’m a senior reporter with Metro newspaper,” reads one such email that was sent to an academic who specializes in Iran. “I would be most grateful if I could have an interview with you.” The fake reporter then sent multiple follow-up emails, including a video call invitation with a link that redirects to a password-harvesting website. Iranian hackers are impersonating journalists, according to Proofpoint. Iranian hackers have also posted as journalists from Fox News, The Guardian and UK news site iNews, according to Proofpoint. Other recent hacking campaigns have focused on breaching the accounts of journalists themselves. SEE ALSO NEWS CORP BREACHED BY HACKERS WITH APPARENT CHINA LINK After the Capitol riots in January 2021, Chinese hackers blanketed White House correspondents and other US politics reporters with phishing emails in attempts to breach their accounts. Later that year, they shifted their focus to reporters covering cybersecurity, surveillance and privacy issues — especially those who write about China, according to Proofpoint. Ahead of Russia’s invasion of Ukraine, the Chinese hackers shifted their focus to journalists covering US and European national security, according to the report. Employees of the New York Post and Wall Street Journal were targeted in an apparent Chinese intelligence-gathering operation, parent company News Corp said in February. North Korean hackers have likewise targeted US journalists using fake job listings, the report says. What do you think? Post a comment. “From intentions to gather sensitive information to attempts to manipulate public perceptions, the knowledge and access that a journalist or news outlet can provide is unique in the public space,” Proofpoint’s researchers wrote. “Targeting the media sector also lowers the risk of failure or discovery to a [hacker] than going after other, more hardened targets of interest, such as government entities.” SHARE THIS ARTICLE: * Facebook * Twitter * Flipboard * WhatsApp * Email * Copy * * Comments Filed under * china * hack * hackers * hacking * iran * turkey * 7/18/22 Read Next How Elon Musk entrusted $5.7 billion to a Russian pothead ... Skip Ads by TRENDING NOW ON NYPOST.COM * This story has been shared 29,720 times. 29,720 'VERY BAD DAY': ANNE HECHE DOWNED VODKA, WINE IN PODCAST POSTED HOURS BEFORE CRASH * This story has been shared 25,979 times. 25,979 DAD INVENTS FLAMETHROWER FOR KIDS TO PLAY WITH AT HOME: 'BEST TOY EVER' * This story has been shared 24,040 times. 24,040 DAD OF 2 WHO LEAPT TO HIS DEATH FROM BRONX BUILDING WITH WIFE WAS AN ACTOR FROM ALBANIA NOW ON PAGE SIX * MELISSA AND JOE GORGA RETURN HOME AFTER SKIPPING TERESA GIUDICE’S WEDDING FOR THE BEACH * SHAWN MENDES SMILES, FLEXES MUSCLES IN MIAMI BEACH AFTER CANCELING TOUR * ALL THE ‘HOUSEWIVES’ AT TERESA GIUDICE AND LOUIS RUELAS’ WEDDING See All VIDEO * VIDEO CATCHES TEENS CRASH STOLEN KIA, TAKE OFF RUNNING ON HIGHWAY NOW ON DECIDER * BILL MAHER SAYS UFOS ARE CASING NAVY PILOTS TO ATTACK ON ‘REAL TIME’ See All WHAT TO SHOP * MASTERCLASS VS. SKILLSHARE: PROS, CONS & THE 35 COURSES I REVIEWED * GET YOUR YARD READY FOR FALL WITH THESE 15 PRODUCTS FOR SALE ON AMAZON * 15 BEST AIR CONDITIONERS OF 2022 TO KEEP YOUR HOME COOL FOR THE HEATWAVE, PER REVIEWS * OUT WITH THE OLD AND IN WITH THE 22 NEW AUGUST PRODUCT LAUNCHES * ULTA FOREVER FABULOUS SALE 2022: 8 BEST DEALS ON CELEB-LOVED BEAUTY PRODUCTS Share Selection * Share selection to Facebook * Share selection to Twitter MORE STORIES PAGE SIX INSIDE TERESA GIUDICE AND LUIS RUELAS' EXTRAVAGANT WEDDING NYPOST 'VERY BAD DAY': ANNE HECHE DOWNED VODKA, WINE IN PODCAST POSTED HOURS BEFORE CRASH * Facebook * Twitter * Instagram * LinkedIn * Email * YouTube * Sections & Features * News * Metro * Sports * Sports Betting * Business * Opinion * Entertainment * Fashion * Shopping * Living * Media * Tech * Real Estate * Astrology * Video * Photos * Visual Stories * Alexa * Covers * Horoscopes * Sports Odds * Podcasts * Columnists * Classifieds * Post Sports+ * Subscribe * Articles * Manage * Newsletters & Feeds * Email Newsletters * RSS Feeds * NY Post Official Store * Home Delivery * Subscribe * Manage Subscription * Delivery Help * Help/Support * About New York Post * Customer Service * App FAQ & Help * Community Guidelines * Contact Us * Tips * Newsroom * Letters to the Editor * Reprints * Careers * Apps * iPhone App * iPad App * Android Phone * Android Tablet * Advertise * Self Service * Media Kit * Contact © 2022 NYP Holdings, Inc. All Rights Reserved Terms of Use Membership Terms Privacy Notice Your Ad Choices Sitemap Your California Privacy Rights Manage Choices SHARE LINK click to copy Send to Email Address Your Name Your Email Address Cancel Post was not sent - check your email addresses! Email check failed, please try again Sorry, your blog cannot share posts by email. Notifications ABOUT YOUR PRIVACY * YOUR PRIVACY * STRICTLY NECESSARY COOKIES * FUNCTIONAL COOKIES * ANALYTICS COOKIES * TARGETING COOKIES * STORE AND/OR ACCESS INFORMATION ON A DEVICE * CREATE A PERSONALISED ADS PROFILE * SELECT PERSONALISED ADS * CREATE A PERSONALISED CONTENT PROFILE * SELECT PERSONALISED CONTENT * SELECT BASIC ADS * MEASURE AD PERFORMANCE * MEASURE CONTENT PERFORMANCE * APPLY MARKET RESEARCH TO GENERATE AUDIENCE INSIGHTS * DEVELOP AND IMPROVE PRODUCTS * USE PRECISE GEOLOCATION DATA * SPECIAL PURPOSES * FEATURES * DO NOT USE YOUR PRIVACY We process your data to deliver content or advertisements and measure the delivery of such content or advertisements to extract insights about our website. We share this information with our partners on the basis of consent and legitimate interest. You may exercise your right to consent or object to a legitimate interest, based on a specific purpose below or at a partner level in the link under each purpose. These choices will be signaled to our vendors participating in the Transparency and Consent Framework. More information about your privacy List of Vendors STRICTLY NECESSARY COOKIES Always Active Strictly necessary cookies are essential for the website to function correctly. These cookies may also be used to assist in fraud prevention and security. You can set your browser to block or alert you about these cookies, but without them, performance of the site may be affected and you may not be able to take full advantage of all services and/or features of the site. FUNCTIONAL COOKIES Functional Cookies No Consent Functional cookies collect information regarding your choices and preferences (such as, your language preference, user name, or location) to provide a more personalized online experience and show you content relevant to where you are, such as customizing a certain webpage or remembering if we have asked you to sign up for our Services. With mobile or other internet enabled devices, functional cookies may collect a unique identifier assigned to an internet enabled device (mobile, tablet), geolocation data or other traffic information for that device. These features help us improve your experience with the website, for example, to determine the appropriate device location during a session or count articles viewed. ANALYTICS COOKIES Analytics Cookies No Consent We and our service providers, such as Google Analytics, use analytics cookies to collect information about your use of the website to help create reports and statistics on the performance of the website, which enable us to improve the way the site works. Analytics cookies collect information such as your IP address, type of device, operating system, referring URLs, country information data and time of page visits, and pages visited. This information allows us to identify overall patterns of usage on the website, and help us record any difficulties you have with website. TARGETING COOKIES Targeting Cookies No Consent These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. STORE AND/OR ACCESS INFORMATION ON A DEVICE Store and/or access information on a device No Consent Cookies, device identifiers, or other information can be stored or accessed on your device for the purposes presented to you. List of Vendors | View Full Legal Text Opens in a new Tab CREATE A PERSONALISED ADS PROFILE Create a personalised ads profile No Consent A profile can be built about you and your interests to show you personalised ads that are relevant to you. List of Vendors | View Full Legal Text Opens in a new Tab SELECT PERSONALISED ADS Select personalised ads No Consent Personalised ads can be shown to you based on a profile about you. List of Vendors | View Full Legal Text Opens in a new Tab CREATE A PERSONALISED CONTENT PROFILE Create a personalised content profile No Consent A profile can be built about you and your interests to show you personalised content that is relevant to you. List of Vendors | View Full Legal Text Opens in a new Tab SELECT PERSONALISED CONTENT Select personalised content No Consent Personalised content can be shown to you based on a profile about you. List of Vendors | View Full Legal Text Opens in a new Tab SELECT BASIC ADS Ads can be shown to you based on the content you’re viewing, the app you’re using, your approximate location, or your device type. Object to Legitimate Interests Remove Objection List of Vendors | View Full Legal Text Opens in a new Tab MEASURE AD PERFORMANCE The performance and effectiveness of ads that you see or interact with can be measured. Object to Legitimate Interests Remove Objection List of Vendors | View Full Legal Text Opens in a new Tab MEASURE CONTENT PERFORMANCE The performance and effectiveness of content that you see or interact with can be measured. Object to Legitimate Interests Remove Objection List of Vendors | View Full Legal Text Opens in a new Tab APPLY MARKET RESEARCH TO GENERATE AUDIENCE INSIGHTS Market research can be used to learn more about the audiences who visit sites/apps and view ads. Object to Legitimate Interests Remove Objection List of Vendors | View Full Legal Text Opens in a new Tab DEVELOP AND IMPROVE PRODUCTS Your data can be used to improve existing systems and software, and to develop new products Object to Legitimate Interests Remove Objection List of Vendors | View Full Legal Text Opens in a new Tab USE PRECISE GEOLOCATION DATA Use precise geolocation data No Consent Your precise geolocation data can be used in support of one or more purposes. This means your location can be accurate to within several meters. List of Vendors | View Full Legal Text Opens in a new Tab SPECIAL PURPOSES Always Active We have a need to use your data for this processing purpose that is required for us to deliver services to you. * TECHNICALLY DELIVER ADS OR CONTENT Switch Label label Your device can receive and send information that allows you to see and interact with ads and content. * ENSURE SECURITY, PREVENT FRAUD, AND DEBUG Switch Label label Your data can be used to monitor for and prevent fraudulent activity, and ensure systems and processes work properly and securely. List of Vendors | View Full Legal Text Opens in a new Tab FEATURES Always Active Features are a use of the data that you have already agreed to share with us. * MATCH AND COMBINE OFFLINE DATA SOURCES Switch Label label Data from offline data sources can be combined with your online activity in support of one or more purposes * LINK DIFFERENT DEVICES Switch Label label Different devices can be determined as belonging to you or your household in support of one or more of purposes. * RECEIVE AND USE AUTOMATICALLY-SENT DEVICE CHARACTERISTICS FOR IDENTIFICATION Switch Label label Your device might be distinguished from other devices based on information it automatically sends, such as IP address or browser type. List of Vendors | View Full Legal Text Opens in a new Tab DO NOT USE Do Not Use No Consent Back Button BACK Vendor Search Filter Button Consent Leg.Interest checkbox label label checkbox label label checkbox label label Clear checkbox label label Apply Cancel Confirm My Choices Reject All Allow All WE VALUE YOUR PRIVACY We and our partners store and access information on your device, such as unique IDs in cookies to process personal data. You may accept and manage your choices at any time by clicking `Manage Choices`, including your right to object where legitimate interest is relied upon. Your choices will be signaled to our partners and will not affect your browsing.Cookie Notice WE AND OUR PARTNERS PROCESS DATA FOR THE FOLLOWING REASONS: Use precise geolocation data. Actively scan device characteristics for identification. Store and/or access information on a device. Create a personalised ads profile. Select personalised ads. Create a personalised content profile. Select personalised content. Select basic ads. Measure ad performance. Measure content performance. Apply market research to generate audience insights. Develop and improve products. List of Partners (vendors) Allow All Manage Choices