Company Twitter
Twitter explained that the attackers used social engineering techniques to gain access to the infrastructure. During the manipulation of several support staff, they fraudulently managed to gain access to the account of one of the support specialists and successfully pass two-factor authentication. Further, using the service interface of the support service, a reset and password change was initiated for a number of known accounts. At the same time, the attackers were not able to obtain the available passwords, which are not stored in the clear and are not available through the support service interface.
The activity of the attackers touched 130 accounts, for 45 of which they managed to reset the password, enter the account and send fraudulent messages. There are suspicions that in addition to sending messages, the attackers may have tried to sell some of the captured accounts. Attackers could also see full statistics on account activity and some personal data that is not shown publicly, such as email and phone number.
According to other sources,
Source: opennet.ru