Skip to content
Techzine Europe
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Europe
  • Techzine Netherlands
Techzine News Security Hackers got into Trump’s Twitter account, days before 2016 election
2 min Privacy & Compliance

Hackers got into Trump’s Twitter account, days before 2016 election

Kimanthi SammySeptember 16, 2020 3:11 pmSeptember 16, 2020
Hackers got into Trump’s Twitter account, days before 2016 election

Edwin, Mattijs, and Victor are three old chaps from the Netherlands who were able to access Donald Trump’s Twitter account in 2016 when they extracted his password from a LinkedIn hack that happened back in 2012.

The three men told reporters that they got the login details from a database that was being shared about hacks from the past and then tried it on his account.

Surprisingly enough, the password, but not the email, tied to the @realdonaldtrump account, worked initially. The Twitter process confirmed that the password was correct. The story was published by the Vrij Nederland (VN), a Dutch magazine published since the Second World War. 

The LinkedIn breach of 2012

The journalist who broke the story, Gerard Janssen, said that the password was among a digital cache of data with 120 million usernames and passwords. It was the highlight of break-ins back in 2012, linked to a LinkedIn breach.

A Russian hacker was able to get the database and put it on the public internet in 2016. The researchers were able to look over the database that had 6.5 million hashed but unsalted passwords. While looking through, they saw an entry for Trump as well as the hash for his password.

Password security still a concern

Using a hash-reversing tool known as John the Ripper, they uncovered Trump’s login credentials. The password was “yourefired,” and after some searching, they found the correct email address (twitter@donaldjtrump.com.)

The three Dutchmen were thwarted by Twitter, which detected that the man who would be president had logged in earlier from New York. Using a proxy server, they found their way into the account. VN was able to provide screenshots of the logged-in account.

The men prepared a report to alert authorities later. It would seem that people have a tendency to use the same password for everything and would benefit from stronger and different passwords in case of doubt.

Tags:

account / Donald Trump / Hackers / Twitter

"*" indicates required fields

Stay tuned, subscribe!

Nieuwsbrieven*
This field is for validation purposes and should be left unchanged.

Related

Twitter will archive unused accounts

Hacker offers Twitter data of 5.4 million accounts for $30,000

Bitcoin scam targets Twitter accounts of celebrities and companies

Editor picks

Leaked LockBit chats reveal how professional ransomware group operates

A major data leak has exposed the inner workings of the notorious ran...

Microsoft introduces huge security risk in OneDrive

Microsoft is rolling out a new OneDrive feature that synchronizes dat...

Simplicity and edge are at the heart of Scale Computing

Scale Computing owes much of its rapid growth to Broadcom's acquisiti...

How Nutanix uses Nutanix

Large IT players have the advantage that their own solutions can also...

Insight: IT in Healthcare

Children with autism treated months earlier thanks to process automation

In the United States, one in 31 children is diagnosed with autism. Th...

EU launches action plan for cybersecurity in healthcare

The European Commission proposes an EU-wide action plan to protect th...

Orange Cyberdefense turns security into a business enabler

Orange Cyberdefense turns security into a business enabler

CEO approaches security from a left and right side

EU proposal gives medical data to product developers

EU proposal gives medical data to product developers

Several organizations want the EU to reshape the European Health Data...

Read more on Privacy & Compliance

Broadcom sends cease-and-desist letter to holders of perpetual VMware licenses

Broadcom sends cease-and-desist letter to holders of perpetual VMware licenses

Since acquiring VMware in November 2023, Broadcom has radically changed its licensing policy. The sale of per...

Mels Dees May 8, 2025
TikTok sends European user data to China: €530 million fine

TikTok sends European user data to China: €530 million fine

The Irish data protection authority has fined TikTok €530 million. The popular app does not comply with EU ...

Berry Zwets May 2, 2025
Microsoft invests heavily in Europe due to Trump

Microsoft invests heavily in Europe due to Trump

Microsoft prepared to take legal action against Trump

Coen van Eenbergen May 2, 2025
The sovereign cloud offers no guarantees, how can it do so?
Top story

The sovereign cloud offers no guarantees, how can it do so?

Using the public cloud inherently requires a degree of trust in the chosen provider. Critical industries and ...

Erik van Klinken February 19, 2025

Tech career

Cloud Account Executive – Slack

Amsterdam Full time

AI & Data Architect

Full time

Tech calendar

Red Hat Summit

May 19, 2025 Boston

Ontdek de kracht van Microsoft Copilot in het MBO

June 4, 2025 Schiphol

Thales on Tour

June 5, 2025 Duffel

Kaseya DattoCon Europe

June 17, 2025 Dublin

Nutanix Cloud Day Nederland 2025

June 17, 2025 Zeist

Nürnberg Digital Festival 2025

June 30, 2025 Nürnberg

Whitepapers

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Try the latest high-end Synology backup system for free

Try the latest high-end Synology backup system for free

How do you ensure that your data is secure and can be quickly restore...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2025 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement