He didn't have a bad password, or forget 2FA. Nobody hacked into Twitter.
They bribed someone at a mobile carrier to dupe his phone's sim card. cnn.com/2019/08/30/tec…
No password, no authentication token, just your phone's SIM card as your ID.
All you really need is to know which mobile provider they use. You don't even need their phone number.
Which is dumb as hell. But your bank does it, your power company does it, your insurance company does it, etc.
It's cheap to do, so they all do it.
By using the cloned SIM, any text message meant for them is sent to you. You can get into any account that uses SMS texting as two factor authentication.
Someone working for $10 - $12 an hour, less than 30 hours a week, no benefits, etc.
They are *ripe* for bribery. Throw around a couple thousand dollars and you'll own anyone on that mobile network.
Using an authenticator app like Google Authenticator or Authy? INFINITELY more secure.
And this dumb "tweet without a password via text" gotta go.
You just social engineer them. Using the right information, you can do the "my phone was stolen and I need a new SIM card" routine, and it'll work. They'll clone you one on the spot.
A SIM card is not your phone's memory. It's your phone's ID. It's the "driver's license" it uses to access a cell network. Dupe it, and the text messages and calls meant for you go to someone else.
Authenticator apps? Not related, more secure.
A bribed employee doesn't care and just clones it.
What's even more frustrating is that there are numerous free authenticators available. All a company would need to do is set one up.
But again, that costs money. Why spend it when you can just keep using SMS when customers don't know any better?
It's like a steel vault with a lock made of lukewarm pastrami.
Stuff like this is why. We end up with a public lazily misinformed and dangerously inept when it comes to the basic tech of the world around us.
It's why the industry went through the trouble of inventing token generators and authentication apps. Nothing's 100%, but real 2FA is designed for security.
Those systems all have known, glaring holes that can be exploited ... and in some cases (phone providers, webmail companies) that point of failure are employees.