This is a text-only version of the following page on https://raymii.org:
---
Title       :   The Twitter Bitcoin hack can happen anywhere humans are involved
Author      :   Remy van Elst
Date        :   31-07-2020
URL         :   https://raymii.org/s/blog/The_twitter_bitcoin_hack_can_happen_anywhere_humans_are_involved.html
Format      :   Markdown/HTML
---



![bill gates][1]

The recent [twitter][2] [hack][3] [involved social engineering][4] and
[access to][5] the [twitter backend][6]. This opinion piece will show you
that this sort of incident can happen everywhere as long as humans are involved.

Everywhere there are manual actions or admin / backend panels, this can happen.
Pay a support-slave enough and they'll delete an account 'by accident'. Or a
rougue sysadmin that disables logging, does something horrible and enables
logging again. Or a sales person giving 100% discounts and disable reporting.

I hope that this piece makes you think about the things that can go wrong at your
company and hopefully you take time to fix it or get it fixed. Or at least mitigate
risks, add some more logging, train your staff, treat them well, etcetera.

The [ars technica][6] article has screenshots of the aledged backend:

![twitter backend][9]


I'll show you that there is no one size fits all solution. Or at least, not a
single fix for all. Treating your employees well, educatingthem on risks
and automating as much as possible will get you a long way."

<p class="ad"> <b>Recently I removed all Google Ads from this site due to their invasive tracking, as well as Google Analytics. Please, if you found this content useful, consider a small donation using any of the options below:</b><br><br> <a href="https://leafnode.nl">I'm developing an open source monitoring app called  Leaf Node Monitoring, for windows, linux & android. Go check it out!</a><br><br> <a href="https://github.com/sponsors/RaymiiOrg/">Consider sponsoring me on Github. It means the world to me if you show your appreciation and you'll help pay the server costs.</a><br><br> <a href="https://www.digitalocean.com/?refcode=7435ae6b8212">You can also sponsor me by getting a Digital Ocean VPS. With this referral link you'll get $100 credit for 60 days. </a><br><br> </p>


### Humans are involved, thus things can go wrong

If you have missed it, just recently very prominent twitter accounts started to
tweet a bitcoin scam. "Transfer bitcoins to here and I'll pay you back the double
amount", in some form or other. As [twitter themselves state][4], their staff
was social engineered and thus access to their internal systems was gained.

My guess is that it's way more easy / cheaper to scam a low level support person or to
offer them a sum of cash to cause an "accident" than to search for vulnerabilities,
exploit one and island-hop further into a network and then execute such an action.

There might not be anything malicious going on, it could just be an actual successfull
phising action. Sucks to be the one that got phished, but the company probably
lacked user security training, or two factor authentication, two ways to mitigate
phishing.

However, imagine yourself being a low level, low paid IT support person with a
slight grudge against the company. It would be a nice revenge to cause public
havoc, or get ransomware inside, or by accident delete important data, while
being able to claim you made an honest mistake, either because of social
engineering or because the manual procedure you were executing should have been
automated away years ago.

Now each and every company I've worked for has had these backend panels. Most of
the time these are built as an aftertought when you grow big enough to hire support
or clercs, lack the same validation / security measures as the customer facing self
service side or there are still manual procedures to be done by helpdesk staff,
which require high level permissions, because automating it takes more time than
just instructing Joe from the helpdesk to not make mistakes.

Each and every other company has these backends and every company also has staff
that can abuse them, willingly or by accident.

### Technical measures for people problems

As they say, security is like an onion, it stinks and makes you cry.  Or, maybe
they mean the layers part. If you train your users, patch your software, have a
web proxy / outgoing filter, strict firewall/vpn, restrict executables, run
antivirus and mandate two factor auth, you make it harder for hackers (and for
your employees), but not impossible. Just as with regular burglars, you only
have to be more secure than your neighbor is in most cases.

If you have none of the above, chances are you've already been hacked but don't
know it. If you do have all of the above, you still can get hacked. Then you hopefully
have proper (offsite) logging in place to reconstruct what happened.

Even with logging it will still cause damage to the company, reconstruction takes
time, backups take time to restore and the damage is already done, causing much
inconvinience.

**Technical measures only go so far in solving people problems. Train all your users
on phising. The hospital I worked at did a massive phising email once a year to
over fifteen thousand staff, each year they saw less and less people filling in
their passwords due to awareness training.**

But, if there is malicious intent, it might be hard to see if it was an accident
or malicious on purpose. Here's another example I've had happen in one of my
companies.

Imagine a sales person being able to assign a discount,
which is a regular part of his job. He sees that every month a report of all the
discounts goes to the sales manager, for checks and balances. But, by accident,
he gives a 100% discount, and next month doesn't see it on the balance sheet.
Maybe because the reporting software never was written for a 100% discount.
Now, six months later, he's has himself a little side business, where he gets
paid directly by some shady customers, who all have 100% discount but stay
under the radar. This can go on forever, until the report is changed, some other
staff member sees the accounts or because someone talks. But by then this person
is long gone with the wind, and if caught, could just claim it was a typo / bug.


### Solution?

In my humble opinion, there is no one size fits all solution. However, splitting
the problem up into seperate categories, solutions come to mind. Both technical
and people-wise.

#### Phising and related security attacks (ransomware):

* Train your employees regularly on security, phising etc.
* Have a proper, fine grained, security infrastructure in place.

One other big thing is to not have a "blame" culture. If employees are likely
to be mistreated after making a mistake, they will cover it up. If you have an
open culture where mistakes can be made and you try to learn from them, people
are more open to admitting failure, which in the long run is better for everyone.

#### Manual procededures that allow for accidents to happen

* Automate them, at least bare minimum make sure users can make no catastrofic
errors.
* If you don't automate them, have a runbook with step by step, almost copy paste
instructions, and a document describing what do to when mistakes are made.
* Log everything in such a way you can reconstruct why errors happened.
* Have regularly tested backups for when things do go wrong.

#### Disgruntled or malicious employee, "accidents"

* Treat your employees well, if they have no reason to go rougue, they are less
likely to do so.
* Have fine grained logging in place
* Make sure no employee can go rougue, by having reports or audits done regularly by others.


### Conclusion

Everywhere humans are doing work, mistakes are made. Twitter was breached due to
social engineering, but the question to ask is, did staff actually need all those
extra rights which the hackers abused? Was there a way that, even with hackers inside,
not all keys to the kingdom where lost right away?

Manual procedures, disgruntled employees and security risks all allow for mistakes
to happen. Mistakes with large consequences, mistakes that maybe are on purpose
and things that shouldn't have happened at all if there was proper tooling in place.

Can you fix it? No, not entirely. You can however get a long way in making sure
it doesn't come to it, and if it does come to it, have proper measures of
reconstructing what happened.

Not all measures are technical, training, checking and treating people well go
a long way. Technical measures can help, but as far as I'm concerned, they cannot
entirely replace people measures.

What follows are a few scenarios and procedures I've come accross in my carreer.


### My examples of backends and manual procedures

In the following paragraph I'll show you one of the backends I worked with,
give you examples of manual procedures and what can go wrong with them.

By showing these scenarios and the ones above, I hope that you can think of the
things in your organization that can be improved.

In my career as a sysadmin I've worked with many different sorts of companies,
as you can see on [the about page][8]. Most of the stories are not applicable
anymore due to procedure changes, policy changes or software updates. Some
information is masked, but you still get the general idea.

#### Every company with Active Directory

Every company with a fleet of windows computers probably uses active directory
to manage users, computers and policies. 90% of those companies have in house
or external helpdesk which users can call to reset their password.

![reset pw][10]

The above dialog window is all that you need to do to reset a users password.
Now there are policies and rights you can manage to let only certain people
reset passwords, but I suspect that your average company just allows the IT
helpdesk to reset passwords for everyone. If you're lucky you have a self service
portal, but who remembers those recovery questions anyway...

After the rougue IT intern has reset the password of the CEO friday evening, he emails a few of
the biggest customers, informing them they're like the backend of a horse, he
resets the twitter password and tweets nasty things on the CEO's account and
sends Sally from finance a few PDF's and requests to pay big amounts to his
bank account. On sunday he's out of state and was never heard from again. Or, he
claims to have been on vacation, and it turns out the culprit was another IT admin you
fired recently, but who still had access because of passwords not changed.

#### Hospital

In the hospital I worked at the electronic medical records were first stored
in  a system named [ZIS (ziekenhuis informatie systeem)][12]. It was a self
written operating system for the PDP-11 from the seventies, as [a research
project][11] for a few large hospitals in the Netherlands. Ported to VAX and
when I worked there it was running on linux machines. [Here is a dutch PDF
describing the migration][19] from VAX to UNIX to LINUX. When active, it
served every hospital digital task, from the finances, to the kitchen, to the
lab and all related to patient care. It had it's own Wordperfect-like text
editor for patient letters (TEKST) and everything you could think of related
to hospital patient care.

I can talk about this system because it has been phased out a few years ago.

Every IT staff had an administrative account which allowed them to kill user sessions
(telnet wasn't the most reliable), reset printers and see everything for every
patient. Here are a few screenshot of the manual procedure to reset a printer:

![zis printer][7]

![zis printer2][13]

First you had to edit the `hosts` file (either with a line editor (`edl/eds`)
like `ed` or  `search`, an interactive version) to find the printer IP address
(tcp/ip was  added in later on in the systems lifetime, before that everything was
connected via serial lines), then in another program (aptly named PRINTER), you
had to reset it via a sequene of commands in an interactive menu.

One time, I even had zis crash with a stacktrace:

![zis stacktrace][14]
![zis stacktrace2][15]

Here's a picture of my user account from back when I was still at university for
my nursing degree:

![zis 5][16]

Here is another screenshot of the program we used to print medication stickers:

![medicator][20]

I studied both nursing and computer science, and worked in the hospital in both
roles. But back to the printer issue. As you can see on the picture, you edited
the system wide hosts file. If you wanted, you could remove lines relating to
other things than just printers, like computers on patient departments used by
nurses to login, or other servers (database etc.). Because printer resetting was
a common occurence, after every paper jam you had to reset it, even interns could
execute this action. As far as I know it never went wrong, but if you screwed
up the hosts file, you could cause a huge impact to the system. Not to mention
other privileged actions like killing user sessions, editing patient records
or removing imaging data.

In the semi-graphical UI based on ZIS, IT staff could even remove patients:

![patient98][18]

That was because at some point in time regular staff were able to duplicate patients,
but not remove them. The duplication button was later removed, but the permission
for IT staff wasn't.

One point to note here is that a lot of permission was granted based on verified
trust. Proper logging and backups were in place and to even be able to work
there you had  to have a VOG (Verklaring omtrent gedrag). A dutch government
(justice department) issued statement telling that you had no earlier offences.
It was specific for the  job required, so if you are a convicted pedophile you
won't get a VOG for a childcare job, but you might get one for a cab driver job.
If you were convicted for drunk driving, you won't get one for a cab driver job
but could get one for a childcare job.

For IT related jobs, at least in the hospital, categories checked were handling
of sensitive data / documents and general convictions as far as I remember.

A few years ago, ZIS was phased out, finally, after 40 years, in favor of some
self written oracle based software, which was later replaced by [Chipsoft HIX][17].

The history of ZIS is so interesting and innovative that I might do an article
on it in the future.



[1]: /s/inc/img/gateshack.png
[2]: http://web.archive.org/web/20200717043020/https://www.zdnet.com/article/twitter-accounts-of-elon-musk-bill-gates-and-others-hijacked-to-promote-crypto-scam/
[3]: http://web.archive.org/web/20200719103957/https://www.cnet.com/news/coordinated-twitter-hack-hits-elon-musk-obama-kanye-west-bill-gates-and-more-in-bitcoin-scam/
[4]: http://web.archive.org/web/20200719060248/https://blog.twitter.com/en_us/topics/company/2020/an-update-on-our-security-incident.html
[5]: https://www.zdnet.com/article/twitter-says-hackers-downloaded-the-data-of-eight-users-in-wednesdays-hack/
[6]: http://web.archive.org/web/20200719061750/https://arstechnica.com/information-technology/2020/07/twitter-lost-control-of-its-internal-systems-to-bitcoin-scamming-hackers/
[7]: /s/inc/img/zis/zis-printer-search.PNG
[8]: /s/static/About.html
[9]: /s/inc/img/twitterbackend.png
[10]: /s/inc/img/reset-pw-ad.jpeg
[11]: /s/inc/img/zis/zis-pdf-lumc.png
[12]: /s/inc/img/zis/zis-krant-centrum-13-leiden-13-juli-1978-jaargang-8.png
[13]: /s/inc/img/zis/zis-printer.png
[14]: /s/inc/img/zis/zis3.bmp
[15]: /s/inc/img/zis/zis.bmp
[16]: /s/inc/img/zis1.png
[17]: https://chipsoft.com/solutions
[18]: /s/inc/img/backend3.png
[19]: /s/inc/img/zis/Extreem_Linux_Zorg_zonder_Zorgen.pdf
[20]: /s/inc/img/zis/medicator.bmp

---

License:
All the text on this website is free as in freedom unless stated otherwise.
This means you can use it in any way you want, you can copy it, change it
the way you like and republish it, as long as you release the (modified)
content under the same license to give others the same freedoms you've got
and place my name and a link to this site with the article as source.

This site uses Google Analytics for statistics and Google Adwords for
advertisements. You are tracked and Google knows everything about you.
Use an adblocker like ublock-origin if you don't want it.

All the code on this website is licensed under the GNU GPL v3 license
unless already licensed under a license which does not allows this form
of licensing or if another license is stated on that page / in that software:

   This program is free software: you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation, either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program.  If not, see <http://www.gnu.org/licenses/>.

Just to be clear, the information on this website is for meant for educational
purposes and you use it at your own risk. I do not take responsibility if you
screw something up. Use common sense, do not 'rm -rf /' as root for example.
If you have any questions then do not hesitate to contact me.

See https://raymii.org/s/static/About.html for details.