{
	"id": "49f14d38-3ce2-443c-89ef-d2bdc4b2febc",
	"created_at": "2026-04-06T00:07:48.118044Z",
	"updated_at": "2026-04-10T03:33:17.914191Z",
	"deleted_at": null,
	"sha1_hash": "1ed523c9bf6487b30f1ea41a06f7e68fc7366a31",
	"title": "FC Barcelona Twitter account hacked – again",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 176258,
	"plain_text": "FC Barcelona Twitter account hacked – again\r\nBy Amer Owaida\r\nArchived: 2026-04-05 17:56:20 UTC\r\nDigital Security\r\nThe same hackers have also gotten their mitts on social media accounts of other high-profile sporting targets\r\n17 Feb 2020  •  , 2 min. read\r\nOurMine, the infamous hacker collective, hijacked the official Twitter accounts of FC Barcelona, the Olympics\r\nand the International Olympic Committee (IOC) on Saturday. The La Liga soccer giant, for one, also ran afoul of\r\nthe group in 2017, when it had both its Facebook and Twitter accounts defaced.\r\nA Twitter spokesperson confirmed for Business Insider that, much like in the previous incidents, the hack occurred\r\nvia a third-party platform. Twitter took action and locked the accounts as soon as it became aware of the issue.\r\nIn a separate statement, an IOC spokesperson confirmed that they are investigating the breach into their social\r\nmedia accounts.\r\nFC Barcelona took to Twitter to acknowledge the attack and announce that it will be conducting a cybersecurity\r\naudit and reviewing its protocols.\r\nhttps://www.welivesecurity.com/2020/02/17/fcbarcelona-twitter-account-hacked-again/\r\nPage 1 of 2\n\nMeanwhile, the hacking group hinted at Neymar’s possible return to the Blaugranas squad, claiming it read\r\nthrough some of the team’s private correspondence. In a now-deleted series of tweets, OurMine also mocked the\r\nSpanish soccer team for falling victim to the same type of attack twice.\r\nThe hacker collective also made headlines earlier this year, when it hijacked the official Twitter accounts of 15\r\nNFL teams and the league itself. Just days ago, OurMine also broke into the Twitter and Instagram accounts for\r\nFacebook and Messenger.\r\nKeep your eye on the ball\r\nAccount takeover attacks typically leverage credential stuffing, an automated method that deploys bots for login\r\nattempts. Using leaked or stolen access credentials from data breaches, the bots will then hammer the sites with\r\nmultiple login attempts until one of the combinations pans out.\r\nTo lower the chances of having your account hacked or taken over, we suggest using two-factor authentication\r\n(2FA), if the option is supported. Many services offer 2FA as an extra layer of security to protect you from account\r\ntakeover attacks.\r\nFacebook, Instagram, and Twitter all offer several 2FA methods, but if you’re not sure if your service of choice\r\noffers such an option you can check here. The second authentication factor offers a valuable additional layer of\r\nprotection in exchange for very little effort – our recent article can teach you the ropes of 2FA.\r\nShould your account still fall victim to an account-takeover attack, you may want to read our article about what to\r\ndo if your Twitter account has been hacked.\r\nLet us keep you\r\nup to date\r\nSign up for our newsletters\r\nSource: https://www.welivesecurity.com/2020/02/17/fcbarcelona-twitter-account-hacked-again/\r\nhttps://www.welivesecurity.com/2020/02/17/fcbarcelona-twitter-account-hacked-again/\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.welivesecurity.com/2020/02/17/fcbarcelona-twitter-account-hacked-again/"
	],
	"report_names": [
		"fcbarcelona-twitter-account-hacked-again"
	],
	"threat_actors": [
		{
			"id": "e4ccfe5c-4d77-4503-bf1c-36076dbd78d0",
			"created_at": "2022-10-25T16:07:24.522697Z",
			"updated_at": "2026-04-10T02:00:05.02215Z",
			"deleted_at": null,
			"main_name": "OurMine",
			"aliases": [
				"ATK 128",
				"TAG-HA10"
			],
			"source_name": "ETDA:OurMine",
			"tools": [],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "74f1da67-5bc9-49ee-ba8e-b7e8b452a2c2",
			"created_at": "2023-01-06T13:46:39.021238Z",
			"updated_at": "2026-04-10T02:00:03.183989Z",
			"deleted_at": null,
			"main_name": "OurMine",
			"aliases": [],
			"source_name": "MISPGALAXY:OurMine",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		}
	],
	"ts_created_at": 1775434068,
	"ts_updated_at": 1775791997,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/1ed523c9bf6487b30f1ea41a06f7e68fc7366a31.pdf",
		"text": "https://archive.orkl.eu/1ed523c9bf6487b30f1ea41a06f7e68fc7366a31.txt",
		"img": "https://archive.orkl.eu/1ed523c9bf6487b30f1ea41a06f7e68fc7366a31.jpg"
	}
}