GoDaddy admits giving up info that led to Twitter username extortion

Share this article:

When Naoki Hiroshima had his coveted @N Twitter username stolen in an elaborate extortion plot involving simple social engineering techniques, the frustrated developer pointed the finger at GoDaddy and PayPal for being careless with his data.

In a post, Todd Redfoot, Chief Information Security Officer with GoDaddy, explained that the attacker had a large amount of Hiroshima's information when he contacted GoDaddy. “The hacker then socially engineered an employee to provide the remaining information needed to access the customer account,” Redfoot said.

While GoDaddy is taking measures to ensure a similar incident does not occur, PayPal has taken a stance it did nothing wrong.

“PayPal did not divulge any credit card details related to this account,” according to a post. “This individual's PayPal account was not compromised.”

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

ISSA tackles workforce gap with career lifecycle program

ISSA tackles workforce gap with career lifecycle program ...

On Thursday, the group launched its Cybersecurity Career Lifecycle (CSCL) program.

Amplification DDoS attacks most popular, according to Symantec

Amplification DDoS attacks most popular, according to Symantec

The company noted in a whitepaper released on Tuesday that Domain Name Server amplification attacks have increased 183 percent between January and August.

Court shutters NY co. selling security software with "no value"

A federal court shut down Pairsys at the request of the Federal Trade Commission.