Incident: Hackers Hijack Essex Police Twitter Account, Direct Followers to Offensive Picture

Published Date: 2015-10-23

Postmortem Analysis
Timeline 1. The software failure incident of hackers hijacking Essex Police's Twitter account happened on October 23, 2015, as reported in [Article 53040].
System 1. Essex Police's online security system [53040]
Responsible Organization 1. Hackers were responsible for causing the software failure incident at Essex Police by hijacking their Twitter account and posting an offensive picture [53040].
Impacted Organization 1. Essex Police's online security was impacted by the software failure incident [53040].
Software Causes 1. The software cause of the failure incident was the vulnerability in the Essex Police Twitter account's security that allowed hackers to hijack the account and send out a rogue tweet containing an offensive picture [53040].
Non-software Causes 1. Lack of strong password security measures [53040] 2. Insufficient account security protocols in place [53040] 3. Failure to detect the breach in a timely manner [53040]
Impacts 1. The software failure incident led to the hijacking of Essex Police's Twitter account by hackers, resulting in the posting of an offensive picture and potentially directing thousands of followers to it [53040]. 2. Users who clicked on the link in the rogue tweet were advised to run a security check on their computers to ensure they were not infected with malware [53040]. 3. The rogue tweet remained on the network for at least 40 minutes before the police realized the account had been hacked, indicating a delay in detection and response to the incident [53040].
Preventions 1. Implementing stronger password policies and regular password changes to prevent unauthorized access [53040]. 2. Conducting regular security audits and reviews to identify vulnerabilities and address them promptly [53040]. 3. Providing cybersecurity training to staff members to increase awareness and prevent social engineering attacks [53040].
Fixes 1. Implementing stronger password policies and regular password changes to enhance security [53040]. 2. Conducting a thorough review of online security measures to identify vulnerabilities and address them promptly [53040]. 3. Enhancing monitoring systems to detect unauthorized access or suspicious activities on the account in real-time [53040]. 4. Providing cybersecurity training to staff members to increase awareness and prevent similar incidents in the future [53040].
References 1. Essex Police statement [53040] 2. Anonymous Twitter user [53040]

Software Taxonomy of Faults

Category Option Rationale
Recurring multiple_organization (a) The article does not provide information about a similar software failure incident happening again within the same organization (Essex Police). (b) The article mentions that the incident involving the Essex Police being hacked on Twitter occurred soon after the financial details of up to 4 million customers of the mobile network TalkTalk were compromised by a cyber-attack. This suggests that similar incidents of cyber-attacks or security breaches have happened at other organizations as well, in this case, TalkTalk [53040].
Phase (Design/Operation) design, operation (a) The software failure incident in the article is related to the design phase. The incident occurred due to hackers hijacking the Essex Police Twitter account, which indicates a breach in the system's security design or implementation. The rogue tweet with an offensive picture was sent out by a hacker, highlighting a vulnerability in the system's design that allowed unauthorized access and malicious activity [53040]. (b) The software failure incident in the article is also related to the operation phase. The incident continued for at least 40 minutes before the police realized the account had been hacked, indicating a failure in the operation or monitoring of the system. The delay in detecting and responding to the unauthorized access and malicious tweet suggests operational shortcomings in managing the security of the Twitter account [53040].
Boundary (Internal/External) within_system (a) The software failure incident reported in Article 53040 falls under the within_system boundary. The failure occurred due to hackers hijacking the Essex Police Twitter account and sending out a rogue tweet containing an offensive picture. This breach of account security and unauthorized access to the Twitter account were internal system vulnerabilities that led to the incident [53040].
Nature (Human/Non-human) non-human_actions (a) The software failure incident in Article #53040 occurred due to non-human actions, specifically hackers hijacking the Essex police Twitter account and posting an offensive picture. The rogue tweet was sent out by a hacker, and the police had to apologize to their followers for the malicious tweet. Additionally, the police advised users who clicked on the link to run a security check on their computers to ensure they were not infected. The incident was a result of the account security being breached by external actors (hackers) without direct human involvement in causing the failure. [53040]
Dimension (Hardware/Software) software (a) The software failure incident reported in Article #53040 was not directly attributed to hardware issues. The incident involved hackers hijacking the Essex Police Twitter account and posting an offensive picture, indicating a breach in online security rather than a hardware-related failure. Therefore, the contributing factors that originated in hardware were not the primary cause of this software failure incident.
Objective (Malicious/Non-malicious) malicious (a) The software failure incident in Article #53040 was malicious in nature. Hackers hijacked the Essex police Twitter account and sent out a rogue tweet containing an offensive picture with a link. The tweet was described as "malicious" and the police advised users not to click on the link. The incident was recognized as a security breach, and steps were taken to prevent a recurrence. Additionally, the police acknowledged that passwords were changed and security was reviewed, indicating an intentional breach by external actors with harmful intent [53040].
Intent (Poor/Accidental Decisions) poor_decisions (a) The intent of the software failure incident: - The software failure incident of hackers hijacking the Essex police Twitter account and posting an offensive picture was due to poor decisions made in terms of online security measures. The incident led to the police issuing an apology to their followers and advising them to run security checks on their computers after clicking on the malicious link [53040].
Capability (Incompetence/Accidental) accidental (a) The software failure incident in Article #53040 was not directly attributed to development incompetence. The incident was caused by hackers hijacking the Essex Police Twitter account, indicating a security breach rather than a failure due to lack of professional competence. (b) The software failure incident in Article #53040 was accidental in nature, as it was caused by hackers gaining unauthorized access to the Essex Police Twitter account and posting offensive content. The police acknowledged the incident as malicious and took steps to prevent a recurrence, indicating that the breach was accidental rather than a result of intentional actions by the organization.
Duration temporary (a) The software failure incident in this case was temporary as the rogue tweet was left on the network for at least 40 minutes before the police realized the account had been hacked. It was then deleted once the breach was identified [53040].
Behaviour crash (a) crash: The software failure incident in Article #53040 can be categorized as a crash. The Essex police Twitter account was hijacked by hackers who sent out a rogue tweet containing an offensive picture, leading to the system losing control and not performing its intended function of maintaining the security and integrity of the account. The tweet was left on the network for at least 40 minutes before the police realized the account had been hacked, indicating a loss of control over the system's state [53040].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence harm, property (d) property: People's material goods, money, or data was impacted due to the software failure The software failure incident involving the hacking of Essex Police's Twitter account resulted in potential harm to users' computers who clicked on the offensive picture link. The police advised users to run security checks on their computers to ensure they had not been infected. Additionally, the incident caused reputational damage to Essex Police as their account was used to post offensive content, leading to a breach of trust with their online followers [53040].
Domain information, finance (a) The failed system in this incident was related to the information industry as it involved the hacking of Essex Police's Twitter account, which is used for communication and dissemination of information [53040]. (h) Additionally, the incident mentioned the financial details of customers being compromised in a separate cyber-attack on the mobile network TalkTalk, which falls under the finance industry [53040].

Sources

Back to List