![](https://pbs.twimg.com/media/DqYWz64WwAIRFpL.jpg)
And, yes, these are all real tweets.
![](https://pbs.twimg.com/media/DqYW13wWsAE_WDM.jpg)
![](https://pbs.twimg.com/media/DqYW16DXgAAIfzl.jpg)
![](https://pbs.twimg.com/media/DqYW19zWkAA-fZE.jpg)
![](https://pbs.twimg.com/media/DqYW1_uX4AcLlGK.jpg)
Firstly, you hack or phish the login credentials for some credible accounts. You’ll need to hack one account to host the scam tweet (@MonsterJobs in this case) and some other good accounts to lend the scam credibility (see above).
#phishing
#scam #onlinesafety
#security #onlinesecurity
This is, however, another example of why companies need proper 24 hour social media monitoring and disaster recovery training. The reputational damage can be immense.
#gemdbs2018