Twitter Hackers Serving Up Extra Large Combos with Burger King

Twitter Hackers Serving Up Extra Large Combos with Burger King

Wouldn’t it be nice to log into Twitter and see an extra 60,000 followers? That’s exactly what happened to Burger King: people began following their account by the tens of thousands. Were they giving away Whoppers? Nope. Hmmm, something seemed a little fishy…fishier than Burger King’s Premium Alaskan Fish Sandwich. Where did all these new followers come from?

Come to find out, Burger King’s Twitter account had been hacked. Before their account was compromised, Burger King had about 50,000 followers but after being hacked, the followers increased to more than 110,000.

It was unclear who was responsible for the hack, but it did demonstrate how quickly a company’s outreach to their loyal fans can turn into an embarrassing situation. At one point, Burger King’s profile message said that they had been sold to McDonald’s, obviously a direct competitor, because the Whopper, Burger King’s flagship sandwich, had flopped.

At another point during the account hacking, McDonald’s tweeted: “We empathize with our @BurgerKing counterparts. Rest assured, we had nothing to do with the hacking.”

So, how did the hijacking happen? To my knowledge, no official reports have been released; however, remember how Twitter is accessed with a username and password? Well, if a person’s computer is infected with malicious software, it is easy for hackers to hijack accounts. Not saying that this is what happened, but it could be one plausible explanation.

Other social media platforms (Facebook and YouTube) offer two-factor authentication, providing greater security because it requires something in addition to a password, like a code sent by text message to a registered mobile device. If Twitter had this type of authentication, hackers would have been forced to get past two layers of security instead of only one.

We may never know the truth as to how or who actually hacked into Burger King’s Twitter account; however, one truth we do know is social media security is a huge issue that can cause major problems.

(Reference: http://www.cbsnews.com/8301-205_162-57569911/burger-king-twitter-hacked-posting-under-mcdonalds/

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

  • Street Smarts

    The ongoing acceptance of AI and advanced data analytics has allowed surveillance camera technology to shift from being a tactical tool to a strategic business solution. Combining traditional surveillance technology with AI-based data-driven insights can streamline transportation systems, enhance traffic management, improve situational awareness, optimize resource allocation and streamline emergency response procedures. Read Now

  • Midtown Manhattan Shooting Kills 4, Including NYPD Officer

    Four people were killed, including a NYPD officer, in a midtown Manhattan shooting on Monday. That’s according to CNN. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities