Sign up for our daily briefing
Make your busy days simpler with Axios AM/PM. Catch up on what's new and why it matters in just 5 minutes.
Stay on top of the latest market trends
Subscribe to Axios Markets for the latest market trends and economic insights. Sign up for free.
Sports news worthy of your time
Binge on the stats and stories that drive the sports world with Axios Sports. Sign up for free.
Tech news worthy of your time
Get our smart take on technology from the Valley and D.C. with Axios Login. Sign up for free.
Get the inside stories
Get an insider's guide to the new White House with Axios Sneak Peek. Sign up for free.
Catch up on coronavirus stories and special reports, curated by Mike Allen everyday
Catch up on coronavirus stories and special reports, curated by Mike Allen everyday
Want a daily digest of the top Denver news?
Get a daily digest of the most important stories affecting your hometown with Axios Denver
Want a daily digest of the top Des Moines news?
Get a daily digest of the most important stories affecting your hometown with Axios Des Moines
Want a daily digest of the top Twin Cities news?
Get a daily digest of the most important stories affecting your hometown with Axios Twin Cities
Want a daily digest of the top Tampa Bay news?
Get a daily digest of the most important stories affecting your hometown with Axios Tampa Bay
Want a daily digest of the top Charlotte news?
Get a daily digest of the most important stories affecting your hometown with Axios Charlotte
Photo illustration: Rafael Henrique/SOPA Images/LightRocket via Getty Images
The hackers who compromised high-profile Twitter accounts this week were a "group of young people" who connected over an interest in "owning early or unusual screen names," the New York Times reported Friday.
Why it matters: That the hackers weren't state-backed or tied to a sophisticated criminal enterprise will likely come as a relief to the public figures — among them Elon Musk, Barack Obama and Bill Gates — who were targeted. But the scheme sowed chaos and uncertainty all the same.
Details: The Times interviewed four people claiming responsibility for the hack and verified their accounts through logs of conversations held while the attack took shape, as well as bitcoin transactions only the hackers could have performed.
- The hackers used their access to high-profile accounts to promote a scam soliciting bitcoin.
- The characterization of the attackers as a group of young, amateur hackers who have a track record of targeting accounts with short, catchy handles like @y and @6 squares with intel that has circulated in hacking and cybersecurity circles since Wednesday's scam.