Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

How to recover from a Twitter hack

Kristin Burnham | April 26, 2013
Do you know what to do if your Twitter account is hacked? Here are four steps to take to regain control of your account and ensure it doesn't happen again.

Tuesday's hacking of the Associated Press' Twitter account is the latest in a number of high-profile social media hijackings.

According to the AP, its Twitter account suffered a phishing attack, which allowed a hacker to publish a tweet that read "Breaking: Two Explosions in the White house and Barack Obama is injured." The tweet, which was sent out just after 1 p.m. EST, panicked Twitter users and caused the Dow Jones Industrial Average to drop 143 points.

Eric Johnson, professor and director of the Center for Digital Strategies at Dartmouth College's Tuck School, says that these types of hacks have become all too common. This year alone, NPR, the BBC, Burger King and Jeep have all had social media accounts compromised.

"Phishing is the most common method used to break into Twitter and steal credentials. They're extremely simple hacks that can cause extreme havoc," Johnson says. "It only takes one simple hack to create a world of problems.

If you or your business falls victim to a social media hack, here are four things you should do to recover from it and ensure it doesn't happen again.

1. Regain Control of Your Account

If your Twitter account has been compromised, the first thing you need to do is change your password immediately, Johnson says. Do this by clicking on the gear icon in the top-right of your screen and select Settings. Click "Password" from the menu on the left and enter in your new password.

If your account has been suspended because Twitter suspects you were hacked, visit to fill out a form that will help you regain access.

Because third-party apps that have access to your Twitter account can be a reason why your account was compromised, Johnson recommends revisiting this list and removing any unnecessary applications.

To see which apps have access to your account, visit your Settings page and click "Apps" from the menu on the left. Revoke access to applications you are unfamiliar with or are no longer using.

2. Delete Posts and Inform Your Audience

Once you've regained control of your account, remove the tweets that the hacker posted. Do this by navigating to your profile, hovering over the offending tweet and clicking "Delete."

Johnson says it's also important to inform your stakeholders of the situation to let them know what happened and that it's under control.

"Time is of the essence. Be sure to rebroadcast the issue on every channel available to you," he says. "Post a message on your website's homepage, tweet it, post it on Facebook and other social media sites. This ensures they know about the problem and it reduces the damage."


1  2  Next Page 

Sign up for CIO Asia eNewsletters.