Twitter was cut down by 17-year-old hacker

In just two weekends, Twitter's 'microblogging' was knocked down twice by a young man living in Brooklyn. The boy said he did so to warn Twitter to patch a security hole and also because he was depressed and wanted to be noticed.

Twitter was cut down by 17-year-old hacker Picture 1
Michael 'Mikeyy' Mooney attacks Twitter

The boy named Michael 'Mikeyy' Mooney said he was very disappointed about Twitter so that the vulnerability happened too long. Therefore, he wanted everyone to pay attention to it.

Just like the worm StalkDaily spread on Saturday (April 11), the worm 'Mikeyy' sent a series of warning messages on users' websites. 'Mikeyy' has begun to spread on this 'microblogging' since early morning on Sunday. This 17-year-old boy has no intention of harming Twitter, so he broadcast a message saying: ' Mikeyy is written by me and ask Twitter to patch this error, cherish Mikeyy '

Mooney has long dreamed of becoming a security expert. He said he started writing computer worms three years ago. He said he wrote these programs not to harm anyone. However, this time, Mooney is depressed and wants to be famous. Mooney believed that the website he created had been active for only a few weeks and that 950 members would "float up" after he spread the attack on Twitter.

On Saturday, Twitter patched the vulnerability that allowed worms to spread throughout the network. ' There are no passwords, phone numbers or personal information stolen, ' the Twitter representative said.

However, on Sunday, Mooney released another type of worm, continuing to take advantage of the vulnerability that Twitter announced patched.

5 ★ | 1 Vote

May be interested

  • Hackers: Crime and punishmentPhoto of Hackers: Crime and punishment
    gather 10 cases of hackers around the world to see how severe the penalties are compared to the crimes committed by them
  • Russian Hacker performs a new attack tacticPhoto of Russian Hacker performs a new attack tactic
    russian hacker has stolen personal information in the us, combined with commercial software and social networks to organize destructive attacks on the internet.
  • Explore System Configuration UtilityPhoto of Explore System Configuration Utility
    among the many wizards and utilities built into microsoft windows xp, system configuration utility or msconfig is a pretty useful utility introduced in the windows 9.x operating system line.
  • Super hackers steal tens of millions of credit card dataPhoto of Super hackers steal tens of millions of credit card data
    in the biggest bank card theft in the united states, 28-year-old hackers were fined $ 2.7 million and have the ability to 'peel off the calendar' for decades in prison.
  • The DDoS attack culprit website Vietco shows up!Photo of The DDoS attack culprit website Vietco shows up!
    subjects conducting attacks to deny distributed services (ddos) on the e-commerce website vietco recently were investigated by the investigating agency on april 28, 2006. the audience has initially embraced ddos behaviors
  • 10 most famous hacks of all timePhoto of 10 most famous hacks of all time
    6 lines of code are enough to blow away $ 10 million of a business. the other 99 lines of code set up the first internet virus (worm). the telephone network of the whole city is controlled only because a hacker wants a fashionable car ... the systems that are considered to be the best security have been penetrated.