Post a Comment Print Share on Facebook

Police: Good prospects to seize the hijackers of the S-twitter

– It is a high priority on this type of attack against the political parties. Typically, there are three variants of offenders: a hostile state, someone who wan

- 5 reads.

Police: Good prospects to seize the hijackers of the S-twitter

– It is a high priority on this type of attack against the political parties. Typically, there are three variants of offenders: a hostile state, someone who wants to influence the opinions or someone who wants to be the ball, and it leans about it in this case, but you don't know, " says detective superintendent Jan Olsson on the police national computer cybercrime centre.

complex cyber-attacks to the overwhelming part can be linked to the foreign players, but in this case it is not possible to exclude the possibility that one or a few in Sweden. There is a good prospect to solve the crime.

Read more: Democrats Twitter hijacked

– it Is a swede who is behind and it is so taffligt done as it looks, then, the forecast is of course good. When the attackers sitting in a country that we don't have diplomatic relations with, it is very svårutrett, " says Olsson.

" Good. We are so-called spoc – single point of contact for these issues to Twitter, Facebook and so on, so all the police issues go through us. We get a lot of information and it is much quicker than in the past, they see the value of being quick, then you have to see if it is enough.

the Attack against the social democrats began with a post at 1.50 on Monday and was followed by twenty pieces up to 3.08. The intrusion was reported to the police and at 9.30 the party was again in the kotroll over his twitter account and all of the fake items were deleted.

– Now we will identify the cause of what has happened and act accordingly. The situation is very serious and we don't see it as finished, it is been reported to the police and we have continued regular contact with the Twitter, says the social Democrats ' spokesman Erik Holm.

in the case, such as what kind of security you had. But for those who are truly motivated, it is a relatively narrow thing to hijack an account, according to Peter Forsman on internet infrastructure foundation in Sweden, IIS.

– Even if you have two-factor authentication, where you confirm his Side of the phone. Otherwise, it could be that you simply test along with username and previously cleared password – up to 65% of all users use the same on at least two different platforms, " says Peter Forsman.

Avatar
Your Name
Post a Comment
Characters Left:
Your comment has been forwarded to the administrator for approval.×
Warning! Will constitute a criminal offense, illegal, threatening, offensive, insulting and swearing, derogatory, defamatory, vulgar, pornographic, indecent, personality rights, damaging or similar nature in the nature of all kinds of financial content, legal, criminal and administrative responsibility for the content of the sender member / members are belong.