Skip to content
Techzine Europe
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Europe
  • Techzine Netherlands
Techzine News Security Hackers got into Trump’s Twitter account, days before 2016 election
2 min Privacy & Compliance

Hackers got into Trump’s Twitter account, days before 2016 election

Kimanthi SammySeptember 16, 2020 3:11 pmSeptember 16, 2020
Hackers got into Trump’s Twitter account, days before 2016 election

Edwin, Mattijs, and Victor are three old chaps from the Netherlands who were able to access Donald Trump’s Twitter account in 2016 when they extracted his password from a LinkedIn hack that happened back in 2012.

The three men told reporters that they got the login details from a database that was being shared about hacks from the past and then tried it on his account.

Surprisingly enough, the password, but not the email, tied to the @realdonaldtrump account, worked initially. The Twitter process confirmed that the password was correct. The story was published by the Vrij Nederland (VN), a Dutch magazine published since the Second World War. 

The LinkedIn breach of 2012

The journalist who broke the story, Gerard Janssen, said that the password was among a digital cache of data with 120 million usernames and passwords. It was the highlight of break-ins back in 2012, linked to a LinkedIn breach.

A Russian hacker was able to get the database and put it on the public internet in 2016. The researchers were able to look over the database that had 6.5 million hashed but unsalted passwords. While looking through, they saw an entry for Trump as well as the hash for his password.

Password security still a concern

Using a hash-reversing tool known as John the Ripper, they uncovered Trump’s login credentials. The password was “yourefired,” and after some searching, they found the correct email address (twitter@donaldjtrump.com.)

The three Dutchmen were thwarted by Twitter, which detected that the man who would be president had logged in earlier from New York. Using a proxy server, they found their way into the account. VN was able to provide screenshots of the logged-in account.

The men prepared a report to alert authorities later. It would seem that people have a tendency to use the same password for everything and would benefit from stronger and different passwords in case of doubt.

Tags:

account / Donald Trump / Hackers / Twitter

"*" indicates required fields

Stay tuned, subscribe!

Nieuwsbrieven*
This field is for validation purposes and should be left unchanged.

Related

Twitter will archive unused accounts

Hacker offers Twitter data of 5.4 million accounts for $30,000

Bitcoin scam targets Twitter accounts of celebrities and companies

Editor picks

Broadcom launches Tomahawk Ultra with 250ns network latency

Broadcom has announced its new Tomahawk Ultra switch for high-perform...

ASML chain moves en masse to Southeast Asia: a sign of things to come?

Brainport companies are investing heavily in Southeast Asia, driven b...

Replatforming virtualized workloads: Do your VMs need a new home?

Finding a balance for VMs and containers

Microsoft offers Europe new terms after complaint about licensing

Microsoft has submitted a new proposal to the European cloud organiza...

Insight: Cloud ERP

ServiceNow aims to disrupt Salesforce with new AI-based CRM

The battle of the titans

SAP seeks AI jewels at every S/4HANA corner

At SAP, AI investments are starting to pay off. Users of the S/4HANA ...

NetSuite shops at Oracle for technology to build out platform

NetSuite shops at Oracle for technology to build out platform

NetSuite is taking full advantage of Oracle technology to build out t...

Workday further elasticates adaptive planning 

Workday further elasticates adaptive planning 

Work, like life, is difficult. But work is now being defined as an in...

Read more on Privacy & Compliance

Nvidia has permission to sell H20 AI chips in China

Nvidia has permission to sell H20 AI chips in China

The US government has permitted Nvidia to resume sales of its H20 AI chip in China. This reversal could gener...

Berry Zwets 11 hours ago
CEOs of Siemens and SAP: revise European AI legislation

CEOs of Siemens and SAP: revise European AI legislation

The CEOs of Siemens and SAP have strongly criticized European AI legislation. They argue that the current rul...

Berry Zwets 2 days ago
European telecom providers oppose network liberalization

European telecom providers oppose network liberalization

A coalition of smaller telecom providers is warning of a "re-monopolization" of the European telecom market. ...

Berry Zwets July 10, 2025
The sovereign cloud offers no guarantees, how can it do so?
Top story

The sovereign cloud offers no guarantees, how can it do so?

Using the public cloud inherently requires a degree of trust in the chosen provider. Critical industries and ...

Erik van Klinken February 19, 2025

Tech calendar

GITEX DIGI_HEALTH 5.0 - Thailand

September 10, 2025 BITEC Bangkok, Thailand

IT Arena

September 26, 2025 Lviv, Ukraine

Innovation Week 2025

October 9, 2025 Prague

Luxembourg Venture Days

October 22, 2025 Luxembourg

Appdevcon

March 10, 2026 Amsterdam

Webdevcon

March 10, 2026 Amsterdam

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2025 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement