Attacks/Breaches

3/25/2010
02:49 PM
50%
50%

Yes, He Can--Hack Into President Obama's Twitter Account

'Hacker Croll' was able to access Obama's Twitter page and other users' accounts simply by guessing passwords

French police arrested a man Thursday for allegedly hacking into the Twitter accounts of U.S. President Barack Obama and other famous individuals.

Authorities said the 24-year-old Frenchman, who has not been identified, used the online pseudonym "Hacker Croll" while breaking into various Web sites.

The man was able to access Obama's Twitter page and other users' accounts simply by guessing passwords, French authorities said.

"He was a young man spending time on the Internet," said French prosecutor Jean-Yves Coquillat, according to London's Telegraph newspaper. "He acted as a result of a bet, out of the arrogance of the hacker. He is the type who likes to claim responsibility for what he has done," said Coquillat.

It's not clear whether the hacker was able to glean any sensitive information from Obama's Twitter account or from the other sites he broke into. He's accused of illegally accessing dozens of Twitter and Facebook pages.

If convicted, the hacker faces up to two years in prison on each count he's charged with.

French authorities reportedly worked with the U.S. Federal Bureau of Investigation to monitor Hacker Croll's online activities and whereabouts, and to eventually bring him to justice.

More than any previous president, Obama has embraced technology for both political and personal purposes.

The president made extensive use of Facebook and other social networking sites during his election campaign last year, and is said to be as addicted to his Blackberry as any mid-level, corporate sales manager.

But Obama's technological bent could leave him more vulnerable than his predecessors to electronic crime. The White House has not officially commented on the matter.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Devastating Cyberattack on Email Provider Destroys 18 Years of Data
Jai Vijayan, Freelance writer,  2/12/2019
Up to 100,000 Reported Affected in Landmark White Data Breach
Kelly Sheridan, Staff Editor, Dark Reading,  2/12/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-8354
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c has an integer overflow on the result of multiplication fed into malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow.
CVE-2019-8355
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. In xmalloc.h, there is an integer overflow on the result of multiplication fed into the lsx_valloc macro that wraps malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow in channels_start in remix.c.
CVE-2019-8356
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. One of the arguments to bitrv2 in fft4g.c is not guarded, such that it can lead to write access outside of the statically declared array, aka a stack-based buffer overflow.
CVE-2019-8357
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c allows a NULL pointer dereference.
CVE-2013-2516
PUBLISHED: 2019-02-15
Vulnerability in FileUtils v0.7, Ruby Gem Fileutils <= v0.7 Command Injection vulnerability in user supplied url variable that is passed to the shell.