Twitter Hackers Serving Up Extra Large Combos with Burger King

Twitter Hackers Serving Up Extra Large Combos with Burger King

Wouldn’t it be nice to log into Twitter and see an extra 60,000 followers? That’s exactly what happened to Burger King: people began following their account by the tens of thousands. Were they giving away Whoppers? Nope. Hmmm, something seemed a little fishy…fishier than Burger King’s Premium Alaskan Fish Sandwich. Where did all these new followers come from?

Come to find out, Burger King’s Twitter account had been hacked. Before their account was compromised, Burger King had about 50,000 followers but after being hacked, the followers increased to more than 110,000.

It was unclear who was responsible for the hack, but it did demonstrate how quickly a company’s outreach to their loyal fans can turn into an embarrassing situation. At one point, Burger King’s profile message said that they had been sold to McDonald’s, obviously a direct competitor, because the Whopper, Burger King’s flagship sandwich, had flopped.

At another point during the account hacking, McDonald’s tweeted: “We empathize with our @BurgerKing counterparts. Rest assured, we had nothing to do with the hacking.”

So, how did the hijacking happen? To my knowledge, no official reports have been released; however, remember how Twitter is accessed with a username and password? Well, if a person’s computer is infected with malicious software, it is easy for hackers to hijack accounts. Not saying that this is what happened, but it could be one plausible explanation.

Other social media platforms (Facebook and YouTube) offer two-factor authentication, providing greater security because it requires something in addition to a password, like a code sent by text message to a registered mobile device. If Twitter had this type of authentication, hackers would have been forced to get past two layers of security instead of only one.

We may never know the truth as to how or who actually hacked into Burger King’s Twitter account; however, one truth we do know is social media security is a huge issue that can cause major problems.

(Reference: http://www.cbsnews.com/8301-205_162-57569911/burger-king-twitter-hacked-posting-under-mcdonalds/

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • Brivo, Eagle Eye Networks Merge

    Dean Drako, Chairman of Brivo, the leading global provider of cloud-native access control and smart space technologies, and Founder of Eagle Eye Networks, the global leader in cloud AI video surveillance, today announced the two companies will merge, creating the world’s largest AI cloud-native physical security company. The merged company will operate under the Brivo name and deliver a truly unified cloud-native security platform. Read Now

  • Security Industry Association Announces the 2026 Security Megatrends

    The Security Industry Association (SIA) has identified and forecasted the 2026 Security Megatrends, which form the basis of SIA’s signature annual Security Megatrends report defining the top 10 factors influencing both near- and long-term change in the global security industry. Read Now

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.