Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Security » Hackers got into Trump’s Twitter account, days before 2016 election
2 min Privacy & Compliance

Hackers got into Trump’s Twitter account, days before 2016 election

Kimanthi SammySeptember 16, 2020 3:11 pmSeptember 16, 2020
Hackers got into Trump’s Twitter account, days before 2016 election

Edwin, Mattijs, and Victor are three old chaps from the Netherlands who were able to access Donald Trump’s Twitter account in 2016 when they extracted his password from a LinkedIn hack that happened back in 2012.

The three men told reporters that they got the login details from a database that was being shared about hacks from the past and then tried it on his account.

Surprisingly enough, the password, but not the email, tied to the @realdonaldtrump account, worked initially. The Twitter process confirmed that the password was correct. The story was published by the Vrij Nederland (VN), a Dutch magazine published since the Second World War. 

The LinkedIn breach of 2012

The journalist who broke the story, Gerard Janssen, said that the password was among a digital cache of data with 120 million usernames and passwords. It was the highlight of break-ins back in 2012, linked to a LinkedIn breach.

A Russian hacker was able to get the database and put it on the public internet in 2016. The researchers were able to look over the database that had 6.5 million hashed but unsalted passwords. While looking through, they saw an entry for Trump as well as the hash for his password.

Password security still a concern

Using a hash-reversing tool known as John the Ripper, they uncovered Trump’s login credentials. The password was “yourefired,” and after some searching, they found the correct email address (twitter@donaldjtrump.com.)

The three Dutchmen were thwarted by Twitter, which detected that the man who would be president had logged in earlier from New York. Using a proxy server, they found their way into the account. VN was able to provide screenshots of the logged-in account.

The men prepared a report to alert authorities later. It would seem that people have a tendency to use the same password for everything and would benefit from stronger and different passwords in case of doubt.

Tags:

account / Donald Trump / Hackers / Twitter

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

Twitter will archive unused accounts

Hacker offers Twitter data of 5.4 million accounts for $30,000

Bitcoin scam targets Twitter accounts of celebrities and companies

Editor picks

Anthropic aims for $30B in funding at a $900B valuation

Anthropic is in talks to raise at least $30 billion at a valuation of...

One year of IFS Nexus Black: major impact on FSM and manufacturing

IFS Nexus Black is celebrating its first anniversary around this time...

“Full-stack AI” sounds appealing, but the IT reality is more complex

IT vendors often choose to market a solution as “full-stack AI,” ...

The sovereign cloud can only be attained by US and China, says Gartner

According to research firm Gartner, only China and the United States ...

Techzine.tv

NetApp balances sovereignty with AI infrastructure needs

NetApp balances sovereignty with AI infrastructure needs

How JFrog secures binaries in the age of AI coding assistants

How JFrog secures binaries in the age of AI coding assistants

Discover how edge AI transforms manufacturing with private 5G

Discover how edge AI transforms manufacturing with private 5G

How Ansible becomes the execution layer for agentic AI

How Ansible becomes the execution layer for agentic AI

Read more on Privacy & Compliance

Wingtech demands billions from the Dutch due to Nexperia interference

Wingtech demands billions from the Dutch due to Nexperia interference

The Chinese technology company Wingtech is preparing an international arbitration case against the Dutch gove...

Mels Dees 2 days ago
OpenAI CEO defends commercial strategy in lawsuit with Elon Musk

OpenAI CEO defends commercial strategy in lawsuit with Elon Musk

The legal battle between Elon Musk and OpenAI took another sharp turn on Tuesday. During a hearing in federal...

Mels Dees 10 hours ago
Workday is well prepared for the EU AI Act, who will follow?
Top story

Workday is well prepared for the EU AI Act, who will follow?

Many organizations are facing a challenging deadline on August 2. The rollout of the EU AI Act, which takes e...

Erik van Klinken April 15, 2026
Metadata, cloud sovereignty’s weak spot
Top story

Metadata, cloud sovereignty’s weak spot

US authorities could access the metadata of public cloud users, even if they use the sovereign offering of an...

Erik van Klinken February 20, 2026

Expert Talks

The only thing constant in technology is change, except for unrealistic hopefulness

The only thing constant in technology is change, except for unrealistic hopefulness

If anyone was ever forced to pick the tritest phrase in the world, it...

mnemonic opens Dutch Security Operations Centre (SOC) and relocates to new office in Utrecht

mnemonic opens Dutch Security Operations Centre (SOC) and relocates to new office in Utrecht

The new SOC in the Netherlands further strengthens mnemonic’s regio...

AI governance: the invisible prerequisite for success

When AI never gets past the demo

Agentic AI is reshaping the network – and it’s time to upgrade

Wireless connectivity is becoming a critical infrastructure for the A...

Tech calendar

Infosecurity Europe

June 2, 2026 London

.NEXT On Tour Amsterdam

June 9, 2026 Amsterdam

Oxygenate

June 11, 2026 Hilversum

VivaTech

June 17, 2026 Paris Expo Porte de Versailles 1 Place de la Porte de Versailles Pavillon 7 F-75015 Paris France

GITEX AI EUROPE 2026

June 30, 2026 Messe Berlin Exhibition Center, South Entrance

GOTO Copenhagen 2026

September 28, 2026 TAP1, Raffinaderivej 10, 2300 København S, Denmark

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2026 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement