Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Security » Hackers got into Trump’s Twitter account, days before 2016 election
2 min Privacy & Compliance

Hackers got into Trump’s Twitter account, days before 2016 election

Kimanthi SammySeptember 16, 2020 3:11 pmSeptember 16, 2020
Hackers got into Trump’s Twitter account, days before 2016 election

Edwin, Mattijs, and Victor are three old chaps from the Netherlands who were able to access Donald Trump’s Twitter account in 2016 when they extracted his password from a LinkedIn hack that happened back in 2012.

The three men told reporters that they got the login details from a database that was being shared about hacks from the past and then tried it on his account.

Surprisingly enough, the password, but not the email, tied to the @realdonaldtrump account, worked initially. The Twitter process confirmed that the password was correct. The story was published by the Vrij Nederland (VN), a Dutch magazine published since the Second World War. 

The LinkedIn breach of 2012

The journalist who broke the story, Gerard Janssen, said that the password was among a digital cache of data with 120 million usernames and passwords. It was the highlight of break-ins back in 2012, linked to a LinkedIn breach.

A Russian hacker was able to get the database and put it on the public internet in 2016. The researchers were able to look over the database that had 6.5 million hashed but unsalted passwords. While looking through, they saw an entry for Trump as well as the hash for his password.

Password security still a concern

Using a hash-reversing tool known as John the Ripper, they uncovered Trump’s login credentials. The password was “yourefired,” and after some searching, they found the correct email address (twitter@donaldjtrump.com.)

The three Dutchmen were thwarted by Twitter, which detected that the man who would be president had logged in earlier from New York. Using a proxy server, they found their way into the account. VN was able to provide screenshots of the logged-in account.

The men prepared a report to alert authorities later. It would seem that people have a tendency to use the same password for everything and would benefit from stronger and different passwords in case of doubt.

Tags:

account / Donald Trump / Hackers / Twitter

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

Twitter will archive unused accounts

Hacker offers Twitter data of 5.4 million accounts for $30,000

Bitcoin scam targets Twitter accounts of celebrities and companies

Editor picks

Edge AI and private 5G are made for each other

Edge AI and private 5G are becoming essential infrastructure for manu...

ServiceNow moves beyond control tower to govern and kill enterprise AI

You need to monitor and control your AI

Runpod Flash: Saviour of the AI inference universe?

AI developer cloud company Runpod has announced Flash, an open source...

SAP makes a double play in data and AI with acquisitions of Prior Labs and Dremio

SAP announces two acquisitions: AI research lab Prior Labs and data l...

Techzine.tv

NetApp balances sovereignty with AI infrastructure needs

NetApp balances sovereignty with AI infrastructure needs

groundcover uses EBPF and AI agents to modernize observability

groundcover uses EBPF and AI agents to modernize observability

How Ansible becomes the execution layer for agentic AI

How Ansible becomes the execution layer for agentic AI

Cisco reimagines network ops with agentic AI

Cisco reimagines network ops with agentic AI

Read more on Privacy & Compliance

Google, Microsoft, and xAI allow the government to test AI models in advance

Google, Microsoft, and xAI allow the government to test AI models in advance

Google, Microsoft, and xAI have agreed to share unreleased versions of their AI models with the U.S. governme...

Mels Dees 1 day ago
Metadata, cloud sovereignty’s weak spot
Top story

Metadata, cloud sovereignty’s weak spot

US authorities could access the metadata of public cloud users, even if they use the sovereign offering of an...

Erik van Klinken February 20, 2026
Workday is well prepared for the EU AI Act, who will follow?
Top story

Workday is well prepared for the EU AI Act, who will follow?

Many organizations are facing a challenging deadline on August 2. The rollout of the EU AI Act, which takes e...

Erik van Klinken April 15, 2026
EU weakens AI rules and faces criticism for kowtowing to Big Tech

EU weakens AI rules and faces criticism for kowtowing to Big Tech

The European Union has reached a provisional agreement on amendments to the AI Act, the comprehensive Europea...

Mels Dees 8 hours ago

Expert Talks

The only thing constant in technology is change, except for unrealistic hopefulness

The only thing constant in technology is change, except for unrealistic hopefulness

If anyone was ever forced to pick the tritest phrase in the world, it...

mnemonic opens Dutch Security Operations Centre (SOC) and relocates to new office in Utrecht

mnemonic opens Dutch Security Operations Centre (SOC) and relocates to new office in Utrecht

The new SOC in the Netherlands further strengthens mnemonic’s regio...

AI governance: the invisible prerequisite for success

When AI never gets past the demo

Agentic AI is reshaping the network – and it’s time to upgrade

Wireless connectivity is becoming a critical infrastructure for the A...

Tech calendar

Red Hat Summit

May 11, 2026 Atlanta

DevOpsCon London

May 11, 2026 London

Digitale soevereiniteit in de boardroom

May 11, 2026 Maarssen

Infosecurity Europe

June 2, 2026 London

.NEXT On Tour Amsterdam

June 9, 2026 Amsterdam

Oxygenate

June 11, 2026 Hilversum

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2026 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement