Share this article

Twitter Hack Used Bitcoin to Cash In: Here's Why

You can send bitcoin from your phone or computer to anyone, just about anywhere in the world. And once you’ve sent it, you can’t get it back.

Updated Sep 14, 2021, 9:31 a.m. Published Jul 16, 2020, 4:11 a.m.
(Michael Dziedzic/ Unsplash, modified by CoinDesk)
(Michael Dziedzic/ Unsplash, modified by CoinDesk)

Someone hacked Twitter Wednesday – and used bitcoin to capitalize on it.

STORY CONTINUES BELOW
Don't miss another story.Subscribe to the The Protocol Newsletter today. See all newsletters

Why?

Bitcoin is an alternative money system based on the value of censorship resistance. In other words, Bitcoin was built from the ground up to evade third-party interference (think banks, governments and law enforcement), making it a natural tool in the hands of a world-class hacker.

Read more: Why Use Bitcoin?

Bitcoin’s value proposition can be broken into a few categories, all based on the technology under the hood.

Once the hacker gets it, it’s theirs

Bitcoin is electronic. A popular meme for bitcoin is “magic internet money,” which, in a sense, it is. Bitcoin operates natively online – you can send bitcoin from your phone or computer to anyone else, just about anywhere in the world, in a few clicks, without anyone being able to stop you. And once you’ve sent it, you can’t get it back.

Read more: Twitter Breach Reactions: Security Professionals Offer an Early Assessment

That feature – or in this case, a bother – is a prime reason the Bitcoin blockchain exists. Bitcoin relies on what are called Peer-to-Peer (P2P) transactions so it can't be confiscated by middlemen such as law enforcement. Once the coins are in someone else's wallet, count them as good as gone.

Bitcoin is pseudonymous

Like many Twitter handles, Bitcoin is pseudonymous. We can’t link an address to a personal identity very easily.

Stolen U.S. dollars (USD), on the other hand, would be near impossible to get into and out of a bank account without being flagged. Traditionally, money is moved from one account to another through a third party.

Legacy systems have the upside of being able to reverse transactions and attach identities to them. That is clearly a disadvantage to hackers. (Notably, reports surfaced of the hacker running a similar campaign on CashApp for USD). Bitcoin transactions, by comparison, are a lot harder to control.

Bitcoin is liquid

Bitcoin is also traded online in a lot of places. Holding bitcoins in your wallet wouldn’t be worth much without people to swap dollars for bitcoins. Launched in 2009, bitcoin is the most established and most highly traded digital asset. It’s also available on popular financial apps such as CashApp or PayPal.

Read more: Is Bitcoin Legal?

“It’s common sense that the attackers would choose bitcoin. Bitcoin is the most censorship resistant and liquid asset in existence,” Blockstream CSO Samson Mow said in a private message.

All this to say the Twitter hacker chose the right cryptocurrency to get U.S. dollars.

But bitcoin can be tracked and traced

Addresses can be tracked, however. And they can also be blackballed by others. By nature, the Bitcoin blockchain is 100% transparent. That means the ins and outs of transactions from one party to another are viewable for all to see with a little know-how.

For example, popular cryptocurrency exchange Coinbase would not allow users of its service to transfer funds to the Twitter hacker’s address.

SPOILS: Over the course of the day, a Bitcoin address associated with the Twitter hack received more than 12 BTC, worth about $110K.
SPOILS: Over the course of the day, a Bitcoin address associated with the Twitter hack received more than 12 BTC, worth about $110K.

Blockchain analytics firm Chainalysis says the 12 or so bitcoins (worth about $110,000 at the time) the hacker netted are already on the move. But we can see where they are going. Some firms are even able to match “meatspace” identities with blockchain ones based on small details hackers overlook.

Having said that, there are tools available to people who really want to obfuscate their transactions, and whoever perpetrated this particular heist seems to be prepared to take measures to protect their loot.

At the end of the day, it’s important that people be wary of promises of free money on the internet – whether that comes in the form of dollars, pounds or bitcoin.

coindesk-twitter-hack-2560x854-03a

More For You

Pudgy Penguins: A New Blueprint for Tokenized Culture

Pudgy Title Image

Pudgy Penguins is building a multi-vertical consumer IP platform — combining phygital products, games, NFTs and PENGU to monetize culture at scale.

What to know:

Pudgy Penguins is emerging as one of the strongest NFT-native brands of this cycle, shifting from speculative “digital luxury goods” into a multi-vertical consumer IP platform. Its strategy is to acquire users through mainstream channels first; toys, retail partnerships and viral media, then onboard them into Web3 through games, NFTs and the PENGU token.

The ecosystem now spans phygital products (> $13M retail sales and >1M units sold), games and experiences (Pudgy Party surpassed 500k downloads in two weeks), and a widely distributed token (airdropped to 6M+ wallets). While the market is currently pricing Pudgy at a premium relative to traditional IP peers, sustained success depends on execution across retail expansion, gaming adoption and deeper token utility.

More For You

MegaETH mainnet to go live Feb. 9 in major test of ‘real-time’ Ethereum scaling

(MegaLabs)

This follows its October 2025 $450 million token sale that was heavily oversubscribed.

What to know:

  • MegaETH, the much-watched high-performance Ethereum layer-2 network, announced that its public mainnet will go live Feb. 9, marking a major milestone for a project that has gained a lot of attention in the scaling landscape.
  • MegaETH positions itself as a “real-time” blockchain for Ethereum, designed to deliver ultra-low latency and massive transaction throughput.