If the FBI comes knocking on a company’s door after a phishing cyberattack, what information will investigators likely be after?

“In the case of Twitter, they are the victim and the FBI is exploring two angles: 1) the attack itself and who has access to sensitive resources that could be maliciously used in the future; 2) The victims that had bitcoin postings on their accounts that were allegedly secured and verified. Both could have legal ramifications for Twitter and obstructing the investigation will not improve security, processes, and platform trust for anyone,” said Morey Haber, chief technology officer and chief information security officer for BeyondTrust, based in Atlanta, GA.

Prefers reduced motion setting detected. Animations will now be reduced as a result.