• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

TechEngage®

Connecting mankind with technology

  • News
  • Reviews
  • Cryptocurrency
  • How-to
  • Roundups
  • Science
    • Energy
    • Environment
    • Health
    • Space
  • Apps
  • More
    • Opinion
    • Noteworthy
    • Culture
    • Events
    • Deals
    • Startups
      • Startup Submissions
  • Videos
  • Tools

Hijackers are spreading IS propaganda using dormant Twitter accounts

Jessica Baron, PhD Jessica Baron, PhD Follow Jessica Baron, PhD on Twitter January 4, 2019

a design with twitter logo
Design by Muntaha | TechEngage
FacebookTweetPinLinkedInPrintEmail

Hackers are exploiting a decade-old loophole in Twitter accounts. Before July, Twitter did not require e-mail verification of their accounts. This meant anyone who didn’t want to give Twitter their e-mail address could just register an account using a fake e-mail address without ever having to click a confirmation link. Users typed in random letters or words using @gmail, @hotmail, @yahoo, etc., and never thought about it again.

Now the Islamic State has discovered that if they uncover dormant accounts with these fake addresses, they can go create the Gmail, Hotmail, or Yahoo accounts themselves. They sent password reset e-mails to the newly-created e-mails and gained access to old Twitter handles to spread propaganda.

If you created a Twitter account a while back and stopped using it, now is the time to delete it!

According to TechCrunch, the scheme was discovered by a hacker and security researcher known as WauchulaGhost, who devotes his time to disrupting the online activities of the Islamic State. He said some of the hacked accounts had tens of thousands of followers.

WauchulaGhost provided a list of hacked accounts to TechCrunch and reported them to Twitter. Many of them have now been deactivated.

Over the last few days, followers of the hacked accounts saw videos in Arabic of Islamic State fighters wielding weapons. Other Tweets contained Arabic text praising violence and terrorist attacks. Some instructed readers to commit acts of violence against non-believers. The hacked accounts also retweeted each other constantly, creating a wave of pro-terrorist propaganda across Twitter.

According to TechCrunch, who reviewed many of the Tweets before they were removed:

“One tweet, roughly translated, used an Islamic State hashtag: ‘…with your cars, let’s go pack, you bomb, go with a bomb, you go in any way.’ Another hijacked account called on Muslims to ‘kill these Christians wherever you find them,’ while another account tweeted about turning the Christmas holidays ‘into grief and horror.'”

While the Islamic State claims to be a Muslim authority, they are a radical group whose actions don’t reflect the teachings of Islam.

While Twitter did respond, they have largely shirked responsibility, telling TechCrunch:

“Reusing email addresses in this manner is not a new issue for Twitter or other online services. For our part, our teams are aware and are working to identify solutions that can help keep Twitter accounts safe and secure.”

This is a disappointing reaction in an age when social media has played a role in everything from election scandals to genocide. It’s clear Twitter wants to do some work to clean up social media. But one wonders why they haven’t been more vigilant.

Twitter has removed over a million accounts that promoted terrorism since August 2015. In July of 2018, they cracked down on bot accounts that violent groups were using to spread propaganda. Nonetheless, they failed to prevent the latest hack.

This isn’t the first time the Islamic State has hacked into Twitter accounts. In 2015 they were able to gain access to the US Military’s Central Command to post threatening messages and videos.

The Islamic State has been on the other side of a Twitter hack as well, courtesy of WachulaGhost. Acting under the banner of the hacker collective Anonymous, over 200 accounts associated with the terrorist group received an LGBT-friendly rainbow makeover back in 2016.

Filed Under: Social Networks, Security Tagged With: Cybersecurity, Data Security, Twitter

Related Stories

  • Cybersecurity expertise as an election winning criterion

    Cybersecurity expertise as an election winning criterion

  • Facebook Messenger rolls out threaded replies for conversations

    Facebook Messenger rolls out threaded replies for conversations

  • ProtonMail is under fire after providing authorities with an activist’s IP address

    ProtonMail is under fire after providing authorities with an activist’s IP address

FacebookTweetPinLinkedInPrintEmail

About Jessica Baron, PhD

I am a technology writer and tech ethics consultant whose work has appeared in international news and trade outlets. I have a PhD in History and Philosophy of Science and write about everything from future military weapons to advances in medicine.

Reader Interactions

Share Your Thoughts Cancel reply

Please read our comment policy before submitting your comment. Your email address will not be used or published anywhere. You will only receive comment notifications if you opt to subscribe below.

Primary Sidebar

Become a contributor

We are accepting contributor applications. All applications will be decided in 3 days after applying. To learn more visit the contributors page.
TextSheet Alternative

6 Top Alternatives to Textsheet for 2025

Muhammad Zeshan Sarwar October 5, 2024

battery draining apps

Top 10 battery draining apps to avoid 2025

Muhammad Abdullah October 5, 2024

Recent Stories

  • 6 Top Alternatives to Textsheet for 2025
  • Top 10 battery draining apps to avoid 2025
  • The Benefits of Having a Small Air Compressor for Flat Tires
  • 4 Best Free VPNs for 2025
  • 9 Best Calendar Apps in 2025

Discover

  • About us
  • Newsroom
  • Staff
  • Advertise
  • Send us a tip
  • Startup Submission Questionnaire
  • Brand Kit
  • Contact us

© 2025 TechEngage®. All Rights Reserved. TechEngage® is a project of TechAbout LLC.

TechEngage® is a registered trademark in the United States under Trademark Number 6823709 and in the United Kingdom under Trademark Number UK00003417167. It is also ISSN protected under ISSN 2690-3776 and has OCLC Number 1139335774.

  • Terms & Conditions
  • Privacy Policy