Twitter CEO Jack Dorsey’s account hacked, racist tweets posted

Agencies
August 31, 2019

San Francisco, Aug 31: Twitter said Friday the account of chief executive Jack Dorsey had been “compromised” after a series of erratic and offensive messages were posted.

The tweets containing racial slurs and suggestions about a bomb showed up around 2000 GMT on the @jack account of the founder of the short messaging service before being deleted.

Some of the tweets contained the hashtag #ChucklingSquad which was believed to indicate the identity of the hacker group.

The messages contained racial epithets, and included a retweet of a message supporting Nazi Germany.

“We’re aware that @jack was compromised and investigating what happened,” a Twitter spokesperson said.

A barrage of comments fired off on the platform questioned why the Twitter co-founder didn’t secure his account with two-factor authentication, and how disturbing a sign it was that the service wasn’t to keep its own chief safe on the platform.

“If you can’t protect Jack, you can’t protect... jack,” one Twitter user quipped.

The news comes with Dorsey and Twitter moving aggressively to clean up offensive and inappropriate content as part of a focus on “safety.” “This might be the only way to get rid of racist tweets on this platform,” a Twitter user commented.

Twitter recently announced they would meet with Manchester United representatives regarding calls for more to be done in preventing racist abuse of footballers on social media platforms.

British-based security consultant Graham Cluley said the incident highlighted the importance of two-factor authentication, where a user must confirm the account via an external service.

“Everyone should ensure they have 2FA enabled, use unique password, and double check what apps they’ve linked to their accounts,” Cluley tweeted.

“Hard to say at moment how he was compromised, but one of those reasons most likely.” Cybersecurity researcher Kevin Beaumont said the account appeared to have been hijacked “via a third party called Cloudhopper, which Twitter acquired about 10 years ago and had access to his account.” Cloudhopper enables users to send tweets on their phones via SMS.

The incident raised fresh concerns about how social media users -- even prominent ones -- can have their accounts compromised and used for misinformation, a point highlighted by Canadian member of parliament Michelle Rempel Garner.

“Between bots, trolls and abuse, I’ve been skeptical about @Twitter as a viable platform for some time now,” Rempel Garner wrote.

“But the fact it took the platform’s owner (@jack) about 30 min to get his hacked account under control is deeply problematic, and makes me worry as an elected official.”

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
December 4,2025

Udupi: A 40-year-old NRI from Udupi has reportedly lost more than Rs 12.25 lakh in an online investment scam operated through Telegram.

According to a complaint filed at the CEN police station, Leo Jerome Mendonsa, who has been working in Dubai for the past 15 years in computer accessories sales, maintains NRI accounts in Karkala and Nitte.

On November 12, 2025, Mendonsa was added to a Telegram group called Instaflow Earnings by unknown individuals. Users identified as Priya and Dipannita persuaded him to invest in “Revenue Tasks.” Initially, Mendonsa transferred Rs 1,100 multiple times and received the promised returns, encouraging him to continue.

On November 14, another user, Nishmitha Shetty, directed him to register on a website, digitvisionuoce.cc, and invest Rs 4 lakh in various shares. Over the next few days, he made multiple transfers totaling Rs 12,25,000, including Rs 50,000 via Google Pay, believing the scheme was legitimate.

After receiving the money, the alleged handlers stopped responding, and neither the invested amount nor the promised profits were returned.

The CEN police have registered a case under Sections 66(C) and 66(D) of the IT Act and Section 318(4) of the Bharatiya Nyaya Sanhita (BNS), and investigations are ongoing.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
November 26,2025

Mangaluru, Nov 26: Mangaluru East police have registered a case following a sophisticated online fraud where a 57-year-old local resident was allegedly cheated out of ₹13.4 lakh after being targeted on Facebook.

The scam began in February when the complainant, while browsing Facebook reels, was contacted by a woman identifying herself as "Lillian Mary George" from London. After establishing a chat relationship, the woman claimed she would visit India in November and bring a significant sum of money.

The trap was sprung on November 15, when the victim received a call from a woman named "Sonali Gupta," who claimed Lillian had arrived at Mumbai International Airport but was detained by customs. The fraudsters convinced the man that Lillian was carrying £25,000 (about ₹26 lakh) in traveller’s cheques and 1 kg of gold (valued at around ₹30 lakh).

Under the pretense of clearing these items, the victim was asked to make numerous online transfers between November 15 and 18 for various bogus charges, including:

•    "Pounds exchange registration"
•    "Customs declaration issues"
•    "Discount charges"
•    "Money-laundering charges"

Believing the fictitious story, the complainant transferred the cumulative sum of ₹13.4 lakh to various bank accounts provided by the fraudsters. He realised he was cheated when the culprits later promised a refund within two days but stopped answering his calls. The Mangaluru East police are now investigating the case, which highlights the continuing threat of transnational cyber fraud using social engineering and promises of fictitious wealth.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
November 24,2025

israelsyra.jpg

Israeli forces have pushed over the Syrian frontier, erecting a checkpoint and stopping vehicles in the southwestern city of Quneitra, in yet another breach of the Arab country’s sovereignty.

The violation took place on Sunday, when the troops made their way across the border, setting up the outpost near the Ain al-Bayda junction in northern Quneitra, Syrian outlets reported.

According to the al-Ikhbariya paper, an Israeli detachment positioned itself at the junction, halting cars and conducting searches.

The Syrian Arab News Agency (SANA) reported that three Israeli military vehicles then moved further into the northern countryside, deploying between the town of Jubata al-Khashab and the villages of Ofaniya and Ain al-Bayda. The agency added that a separate Israeli unit mounted a new incursion in the central region, approaching the villages of Umm Batina and al-Ajraf.

Residents said such activities have surged in recent months, pointing to Israeli advances onto farmland, leveling of extensive forested areas, arrests, and spread of mobile checkpoints.

The Israeli regime began markedly increasing its military aggression against Syria last year.

The escalation coincided with increasingly ferocious onslaughts throughout the country by the so-called Hay'at Tahrir al-Sham (HTS) Takfiri terrorist group, which the government of President Bashar al-Assad had confined to northwestern Syria. The HTS, however, managed to overthrow the government as the Israeli attacks would pummel the country’s civilian and defensive infrastructure.

Various reports have shown that, during the escalation, the regime conducted more than 1,000 airstrikes on the Syrian territory and over 400 ground raids into the south.

Following the collapse of the Assad government, Tel Aviv also widened its grip over the occupied Golan Heights by taking control of a demilitarized buffer zone, in defiance of a 1974 Disengagement Agreement. Earlier this month, senior Israeli officials, including Prime Minister Benjamin Netanyahu, visited the buffer zone, prompting expressions of alarm on the part of the United Nations.

The United States, the regime’s biggest ally, has, meanwhile, been fraternizing the HTS head Abu Mohammed al-Jolani amid the widely reported prospect of rapprochement with Tel Aviv.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.