A string of top accounts on the new pro-Trump app GETTR were hacked and defaced on its July 4 launch day, and the person claiming to be the hacker says the site still has several security bugs

Advertisement
A string of top accounts on the new pro-Trump app GETTR were hacked and defaced on its July 4 launch day, and the person claiming to be the hacker says the site still has several security bugs
Several verified accounts were targeted in the cyberattack, including those of Marjorie Taylor Greene, Jason Miller, and Mike Pompeo. GETTR
  • GETTR, founded by former Trump aide Jason Miller, was hacked on the day of its official launch.
  • The accounts of Miller and other Trump allies were targeted Sunday, but have since been restored.
  • A man claiming responsibility told Insider the hack was "easy", and that the site still has many bugs.

GETTR, the new social media platform set up by allies of former President Donald Trump, still has several unresolved security bugs a day after it was hacked on its July 4 launch.

The platform's most popular verified users, mostly former Trump aides, had their accounts compromised on Sunday and GETTR's official support page was also targeted.

Jason Miller, who founded the platform and was formerly a spokesperson to Trump, had his page taken over.

Advertisement

The accounts of Mike Pompeo, Steve Bannon, Marjorie Taylor-Greene, Harlan Hill, Sean Parnell, and the pro-Trump broadcaster Newsmax were also hacked.

All of these account's profiles were changed to show the same message: "@JubaBaghdad was here :) ^^ free palestine ^^."

A string of top accounts on the new pro-Trump app GETTR were hacked and defaced on its July 4 launch day, and the person claiming to be the hacker says the site still has several security bugs
GETTR's official @support page was hacked and defaced. GETTR

The accounts were first hacked around 8:30 a.m. EST on Sunday, and the majority of the profiles returned to their previous state by 10 a.m. EST.

Advertisement

On Monday, @JubaBaghdad told Insider that although GETTR fixed the initial bug he said he used in the attack, he was still able to scrape user data from individual accounts, including email addresses and birth years. He confirmed this by sharing details of a test account that Insider set up.

When asked why he decided to target the social media platform, he said it was "just for fun" and that it had been "easy" from a technical standpoint - roughly 20 minutes of work.

@JubaBaghdad said he is a "bounty hunter" of software bugs, tracking down and reporting problematic code in exchange for a financial reward from companies like Google or Facebook. GETTR has no such program, he said.

Advertisement

"They should not publish the website before making sure everything, or at least almost everything, is secure," he added. He did not disclose how he took control of the accounts.

Miller, GETTR's CEO, told Insider on Sunday: "You know you're shaking things up when they come after you. The problem was detected and sealed in a matter of minutes, and all the intruder was able to accomplish was to change a few user names. The situation has been rectified and we've already had more than half a million users sign up for our exciting new platform!"

The platform is off to a bumpy start more broadly.

Advertisement

GETTR was flooded with pornographic images and GIFs on Saturday, Insider reported. Users spammed the platform's first post with graphic hentai videos and images of Hillary Clinton's face photoshopped onto a woman's naked body, Mother Jones reported.

{{}}