Short Bytes: In a surprising incident, Mark Zuckerberg’s Twitter and Pinterest accounts were compromised this Sunday. A Saudi Arabia-based hacking group managed to hack his account using credentials found in the recent LinkedIn breach. Interestingly, the hackers tweeted that his LinkedIn password was “dadada”.
Well, it looks like even the billionaire CEO isn’t safe from hacking attacks. On Sunday, Zuckerberg’s Twitter and Pinterest accounts were hijacked by the hacking group OurMine Team.
Before taking down his official Twitter account, the hackers posted on Twitter that they found Zuckerberg’s credentials in the recent LinkedIn data breach. The LinkedIn breach leaked millions of LinkedIn account details. As people reuse the same credentials on other accounts too, this hack was being taunted as a major security threat.
The LinkedIn breach leaked millions of LinkedIn account details. As people reuse the same credentials on other accounts too, this hack was being taunted as a major security threat.
Hackers got access to Zuckerberg’s password by breaking the SHA1-password string and tried it on multiple social media websites.
The hackers tweeted that his LinkedIn password was “dadada” and he used it for other accounts.
“Hey @finkd, you were in Linkedin Database with the password ‘dadada’ !,” the team wrote from Zuckerberg’s Twitter.
In a series of tweets, hackers also claimed to hack Zuckerberg’s Instagram account, but this claim hasn’t been verified yet.
Interestingly, Zuckerberg hasn’t posted anything on Twitter since 2012. Meanwhile, his Twitter and Pinterest accounts have been brought back and offending posts have been deleted.
The internet users and fossBytes readers should take this opportunity to set strong passwords for their online accounts and avoid reusing them.
Talking about the hacking group OurMine, it has a history of launching DDoS attacks on banks and other financial institutions. The group also made it to the headlines in January 2016 when they hacked 200,000 users’ information from DayZ.
Did you find this article helpful? Don’t forget to drop your feedback in the comments section below.