Reuters / AFP
Twitter says hackers manipulated staff and used their credentials to access internal systems in a cyber-attack of celebrity accounts earlier this week.
The hackers had “accessed tools only available to our internal support teams” to target 130 accounts, it said.
They reset the passwords of 45 accounts before logging in and sending tweets.
The security breach saw accounts including those of Barack Obama, Elon Musk, Kanye West and Bill Gates tweet a Bitcoin scam to millions of followers.
The FBI is investigating the hack and Twitter said it would support all efforts to find those responsible.
“We’re embarrassed, we’re disappointed, and more than anything, we’re sorry,” the company said.
How did the attack unfold?
In an update, Twitter said the attackers had targeted certain Twitter employees through a “social engineering scheme”.
“In this context, social engineering is the intentional manipulation of people into performing certain actions and divulging confidential information,” it said.
A small number of staff had been successfully manipulated, it said.
Once inside Twitter’s internal systems, the hackers were not able to see users’ previous passwords but could access personal information including email addresses and phone numbers as these are visible to staff using internal support tools.
They may also have been able to view additional information, the company said. There has been speculation that this could include direct messages.
The private messages of Kanye West, Kim Kardashian West or Elon Musk could be worth money on dark web forums. Selling the private messages of presidential hopeful Joe Biden or former mayor of New York Michael Bloomberg could also have political consequences.
Twitter said the hackers may also have tried to sell some of the compromised usernames. In eight cases the hackers also downloaded account data. None of the eight accounts affected were verified accounts.
Twitter was “actively working on communicating directly” with the affected users, the statement said. It was also continuing to restore access for other users still locked out of their accounts as a result of the firm’s initial response to the hack.
What happened during the hack?
On 15 July, a number of Bitcoin-related accounts began tweeting what appeared to be a simple Bitcoin scam, promising to “give back” to the community by doubling any Bitcoin sent to their address.
Then, the apparent scam spread to high-profile accounts such as Kim Kardashian West and Joe Biden, and those of corporations Apple and Uber.
Twitter scrambled to contain the unprecedented attack, temporarily preventing all verified users – those with a blue tick on their accounts – from tweeting.
However, US President Donald Trump, one of the most prominent Twitter users, was unaffected.
There has been speculation for some time that President Trump has extra protections in place after his account was deactivated by an employee on their last day of work in 2017.
The New York Times confirmed that was how Mr Trump’s account escaped the attack, citing an anonymous White House official and a separate Twitter employee.
Despite the fact that the scam was obvious to some, the attackers received hundreds of transfers, worth more than $100,000 (£80,000).
What do we know about the attackers?
Bitcoin is extremely hard to trace and the three separate crypto-currency wallets that the cyber-criminals used have already been emptied.
The digital money is likely to be split into smaller amounts and run through so-called “mixer” or “tumbler” services to make it even harder to trace back to the attackers.
Media playback is unsupported on your device
Media captionBitcoin explained: How do crypto-currencies work?
Clues about those responsible have surfaced through bragging on social media – including on Twitter itself.
Earlier this week, researchers at cyber-crime intelligence firm Hudson Rock spotted an advert on a hacker forum claiming to be able to steal any Twitter account by changing the email address to which it is linked.
The seller also posted a screenshot of the panel usually reserved for high-level Twitter employees. It appeared to allow full control of adding an email to an account or “detaching” existing ones.
This means that the attackers had access to the back end of Twitter at least 36-48 hours before the Bitcoin scams began appearing on Wednesday evening.
The researchers have also linked at least one Twitter account to the hack, which has now been suspended.