Skip to content
By using Twitter’s services you agree to our Cookies Use. We and our partners operate globally and use cookies, including for analytics, personalisation, and ads.
  • Home Home Home, current page.
  • Moments Moments Moments, current page.

Saved searches

  • Remove
  • In this conversation
    Verified accountProtected Tweets @
Suggested users
  • Verified accountProtected Tweets @
  • Verified accountProtected Tweets @
  • Language: English UK
    • Bahasa Indonesia
    • Bahasa Melayu
    • Català
    • Čeština
    • Dansk
    • Deutsch
    • English
    • Español
    • Filipino
    • Français
    • Hrvatski
    • Italiano
    • Magyar
    • Nederlands
    • Norsk
    • Polski
    • Português
    • Română
    • Slovenčina
    • Suomi
    • Svenska
    • Tiếng Việt
    • Türkçe
    • Ελληνικά
    • Български език
    • Русский
    • Српски
    • Українська мова
    • עִבְרִית
    • العربية
    • فارسی
    • मराठी
    • हिन्दी
    • বাংলা
    • ગુજરાતી
    • தமிழ்
    • ಕನ್ನಡ
    • ภาษาไทย
    • 한국어
    • 日本語
    • 简体中文
    • 繁體中文
  • Have an account? Log In
    Have an account?
    · Forgotten your password?

    New to Twitter?
    Sign up
RachelTobac's profile
Rachel Tobac
Rachel Tobac
Rachel Tobac
Verified account
@RachelTobac

Tweets

Rachel TobacVerified account

@RachelTobac

Hacker | CEO @SocialProofSec social engineering/hacking talks, training, pentests | 3X @DEFCON🥈| Chair @WISPorg | Technical Advisory Council @CISAgov | She/her

San Francisco, CA
SocialProofSecurity.com
Joined March 2015

Tweets

  • © 2022 Twitter
  • About
  • Help Centre
  • Terms
  • Privacy policy
  • Cookies
  • Ads info
Dismiss
Previous
Next

Go to a person's profile

Saved searches

  • Remove
  • In this conversation
    Verified accountProtected Tweets @
Suggested users
  • Verified accountProtected Tweets @
  • Verified accountProtected Tweets @

Promote this Tweet

Block

  • Tweet with a location

    You can add location information to your Tweets, such as your city or precise location, from the web and via third-party applications. You always have the option to delete your Tweet location history. Learn more

    Your lists

    Create a new list


    Under 100 characters, optional

    Privacy

    Copy link to Tweet

    Embed this Tweet

    Embed this Video

    Add this Tweet to your website by copying the code below. Learn more

    Add this video to your website by copying the code below. Learn more

    Hmm, there was a problem reaching the server.

    By embedding Twitter content in your website or app, you are agreeing to the Twitter Developer Agreement and Developer Policy.

    Preview

    Why you're seeing this ad

    Log in to Twitter

    · Forgotten your password?
    Don't have an account? Sign up »

    Sign up for Twitter

    Not on Twitter? Sign up, tune into the things you care about, and get updates as they happen.

    Sign up
    Have an account? Log In »

    Two-way (sending and receiving) short codes:

    Country Code For customers of
    United States 40404 (any)
    Canada 21212 (any)
    United Kingdom 86444 Vodafone, Orange, 3, O2
    Brazil 40404 Nextel, TIM
    Haiti 40404 Digicel, Voila
    Ireland 51210 Vodafone, O2
    India 53000 Bharti Airtel, Videocon, Reliance
    Indonesia 89887 AXIS, 3, Telkomsel, Indosat, XL Axiata
    Italy 4880804 Wind
    3424486444 Vodafone
    » See SMS short codes for other countries

    Confirmation

     

    Welcome home!

    This timeline is where you’ll spend most of your time, getting instant updates about what matters to you.

    Tweets not doing it for you?

    Hover over the profile pic and click the Following button to unfollow any account you're not interested in anymore.

    Say a lot with a little

    When you see a Tweet you love, tap the heart – it lets the person who wrote it know that you appreciate them.

    Spread the word

    The fastest way to share someone else’s Tweet with your followers is with a Retweet. Tap the icon to send it instantly.

    Join the conversation

    Add your thoughts about any Tweet with a Reply. Find a topic you’re passionate about and jump right in.

    Learn the latest

    Get instant insight into what people are talking about right now.

    Get more of what you love

    Follow more accounts to get instant updates about topics you care about.

    Find out what's happening

    See the latest conversations about any topic instantly.

    Never miss a Moment

    Catch up instantly on the best stories happening as they unfold.

    Rachel Tobac‏Verified account @RachelTobac 15 Jul 2020

    Yikes, strongest hypothesis is that the attackers have owned Twitter’s employee admin panel which allows Twitter employees ability to change pw/disable MFA to allow an attacker to take over a prominent account and tweet on their behalf without dealing with their password or MFA.

    2:12 pm - 15 Jul 2020
    • 713 Retweets
    • 1,892 Likes
    • Mabel Dws billie Bison Jan Michael Christian James Carter Dante Catalfamo Katharina Schmoelz Ons A. Keira Kerr
    57 replies . 713 retweets 1,892 likes
      1. New conversation
      2. Rachel Tobac‏Verified account @RachelTobac 15 Jul 2020

        If that is the case, I’m hoping companies all over the world learn from this example: attackers can’t leverage these tools if your employees don’t have back end access to make these account changes. Reduce admin privileges now.

        10 replies . 136 retweets 697 likes
        Show this thread
      3. Rachel Tobac‏Verified account @RachelTobac 15 Jul 2020

        And to be clear, anyone claiming to know with absolute certainty likely does not. This is just the strongest hypothesis I’ve seen thus far, which I’m sharing so that folks don’t wrongly lose hope in MFA security (which is unlikely in this scenario).

        5 replies . 47 retweets 319 likes
        Show this thread
      4. Rachel Tobac‏Verified account @RachelTobac 15 Jul 2020

        In regards to an attack on a social media scheduler, app, api, or tweet manager, that is of course possible, but my best guess is that if that were the attack vector that the tweet source label on each compromised tweet would list that manager. Like “tweetdeck”, for instance.

        5 replies . 32 retweets 210 likes
        Show this thread
      5. Rachel Tobac‏Verified account @RachelTobac 15 Jul 2020

        I'm a hacker who uses this attack vector in pentests and my guess is this is likely a system AND human process issue. Helping orgs avoid this *very* scenario & reduce the level of access I could get if I own an employee's environment is common -- which informs my hypothesis here.

        8 replies . 37 retweets 272 likes
        Show this thread
      6. Rachel Tobac‏Verified account @RachelTobac 15 Jul 2020

        Lots of additional ideas, figured I should address them: - "Everyone should turn on MFA!" (I agree completely! But that is likely not the issue in this specific attack, but yes) - "Looks like SIM swapping" (Unlikely that all those prominent accounts don't use MFA hardware tokens)

        3 replies . 30 retweets 189 likes
        Show this thread
      7. Rachel Tobac‏Verified account @RachelTobac 15 Jul 2020

        I know blue check @kevincollier can’t tweet out his piece with me and others right now for @NBCNews so I’ll do it for him:https://www.nbcnews.com/tech/security/suspected-bitcoin-scammers-take-over-twitter-accounts-bill-gates-elon-n1233948 …

        1 reply . 30 retweets 131 likes
        Show this thread
      8. Rachel Tobac‏Verified account @RachelTobac 15 Jul 2020

        Also going live with @RichardMadan of @ctvnews in 7 minutes, if you want to tune in to hear live discussion there.

        3 replies . 6 retweets 85 likes
        Show this thread
      9. Rachel Tobac‏Verified account @RachelTobac 15 Jul 2020

        Folks are wondering "if your hypothesis is that an attacker could gain access to an admin panel, whose to say it's not an insider threat attack!" To that I say -- it absolutely could be! We've seen employees at FB use internal tools to harm others, & happened at Snapchat, too.

        5 replies . 29 retweets 140 likes
        Show this thread
      10. Rachel Tobac‏Verified account @RachelTobac 15 Jul 2020

        Rachel Tobac Retweeted Rachel Tobac

        Another strong hypothesis to add to the short list of hypotheses. Thanks @evantobac for this one.https://twitter.com/RachelTobac/status/1283550225584381954?s=20 …

        Rachel Tobac added,

        Rachel TobacVerified account @RachelTobac
        Another possible attack vector in the Twitter hack -- a new Twitter API supposed to go live tomorrow, interesting timing. This is certainly a possibility to add to a list of hypotheses: new Twitter API vuln used, or an old Twitter API vuln burned before sunset. Thanks @evantobac. https://twitter.com/evantobac/status/1283549129658888193 …
        3 replies . 15 retweets 90 likes
        Show this thread
      11. Rachel Tobac‏Verified account @RachelTobac 15 Jul 2020

        Thanks @rachelerman @washingtonpost for reaching out to talk through hypotheses for the Twitter hack. Appreciate you chatting with additional folks in the security space on this topic!https://www.washingtonpost.com/technology/2020/07/15/musk-gates-twitter-hack/ …

        5 replies . 14 retweets 73 likes
        Show this thread
      12. Rachel Tobac‏Verified account @RachelTobac 15 Jul 2020

        Rachel Tobac Retweeted Twitter Support

        And to close this loop. Turns out my hypothesis was correct. Social engineering attack to gain access to internal credentials and carry out attack on internal Twitter admin panel. https://twitter.com/twittersupport/status/1283591846464233474?s=21 ….https://twitter.com/TwitterSupport/status/1283591846464233474 …

        Rachel Tobac added,

        Twitter SupportVerified account @TwitterSupport
        We detected what we believe to be a coordinated social engineering attack by people who successfully targeted some of our employees with access to internal systems and tools.
        Show this thread
        4 replies . 49 retweets 176 likes
        Show this thread
      13. Rachel Tobac‏Verified account @RachelTobac 15 Jul 2020

        Rachel Tobac Retweeted Twitter Support

        Twitter confirmed my hypothesis and now mitigating like I and others say recommended: limiting employee admin access. The more employees who have access, the more people I can social engineer to carry out my attacks. https://twitter.com/twittersupport/status/1283591853955219458?s=21 …https://twitter.com/TwitterSupport/status/1283591853955219458 …

        Rachel Tobac added,

        Twitter SupportVerified account @TwitterSupport
        Internally, we’ve taken significant steps to limit access to internal systems and tools while our investigation is ongoing. More updates to come as our investigation continues.
        Show this thread
        3 replies . 41 retweets 153 likes
        Show this thread
      14. Rachel Tobac‏Verified account @RachelTobac 15 Jul 2020

        After Twitter reduces admin access privileges for the majority of employees, the next step is to require hardware MFA to secure their admin access. I understand admin access exists for a reason, and I know people don’t like it exists. Securing access to it is a must.

        5 replies . 18 retweets 138 likes
        Show this thread
      15. Rachel Tobac‏Verified account @RachelTobac 15 Jul 2020

        Also, interested to hear more about the possibility of an insider attack leveraging said admin panel to carry out this attack. Either way, admin privileges are an issue, and the human element is involved. Huge story by @josephfcox. https://www.vice.com/en_us/article/jgxd3d/twitter-insider-access-panel-account-hacks-biden-uber-bezos …

        3 replies . 31 retweets 114 likes
        Show this thread
      16. Rachel Tobac‏Verified account @RachelTobac 15 Jul 2020

        Do I consider paying an employee to access their admin panel to be social engineering? Nah, that’s more like an insider threat — still boils down to a human element, admin panel based attack & admin privileges issue though, rather than SIM swap, MFA, or API issue, for example.

        6 replies . 11 retweets 95 likes
        Show this thread
      17. Rachel Tobac‏Verified account @RachelTobac 16 Jul 2020

        I’m sure we’ll find out more details that help us unpack the language Twitter used to describe “social engineering” — and clarify the insider vs. outsider admin panel steps. If insider turns out to be legit, there’s going to be quite the interest in insider threat detection.

        3 replies . 6 retweets 83 likes
        Show this thread
      18. End of conversation

    Loading seems to be taking a while.

    Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

      Promoted Tweet

      false

      • © 2022 Twitter
      • About
      • Help Centre
      • Terms
      • Privacy policy
      • Cookies
      • Ads info