Skip to main content

These embarrassing passwords got celebrities hacked

One thing that celebrities have in common with everyday people is that they are also susceptible to cybersecurity breaches. Many public figures have had their private and public tech accounts hacked over the years and these attacks have often been due to them simply having weak passwords that were easy for bad actors to figure out.

Socialites, actors, politicians, and even prominent tech figures are guilty of lazy password practices, and falling victim to cybercrime that has compromised their passwords.

Recommended Videos

President Donald Trump

Trump with Facebook and Twitter logos stylized image
Getty Images/Digital Trends Graphic

In 2018, a Dutch hacker famously gained access to former President Donald Trump’s Twitter account by simply guessing the password, yourefired, which was his catchphrase on his reality show, The Apprentice.

In 2020, the same hacker was able to infiltrate Trump’s Twitter account again by guessing the password once more, as maga2020!, another catchphrase of his.

The lesson here? One, keep your catchphrases to yourself. Second, don’t use the current year or an exclamation point at the end of your password. It might satisfy the password generators, but it’s the most obvious and commonly used special characters.

Paris Hilton

In 2007 Paris Hilton with her pink Motorola Razr V3 made the Razr the most popular phone. (Credit: MTV)

In 2005, socialite and heiress Paris Hilton’s T-Mobile account was hacked after bad actors figured out the password was tinkerbell, the name of her beloved pet Chihuahua. However, others have discussed that the password might not have directly been Tinkerbell but somehow related to the name.

Techdirt Editor-in-Cheif, Mike Masnick noted that a common security question when resetting a password is “What is your favorite pet’s name?” For Hilton, the obvious answer would be Tinkerbell. From there, a bad actor could input their own password and access her account.” It wasn’t necessarily social engineering or a security hole or even real hacking (though, in some sense, it was a combination of all three),” Masnick added.

The lesson here is simple: if you have a famous dog, don’t make it the answer to your security question. That might not apply to the average person, but the idea is to make sure answers to security questions are obscure enough to only be known by you.

Mark Zuckerberg

Facebook F8
Facebook CEO Mark Zuckerberg Facebook

Meta (formerly Facebook) CEO Mark Zuckerberg had his Pinterest, Twitter, and Instagram compromised in 2016 by the hacker group OurMine for having the notoriously lazy password of dadada.

Look, this one should be obvious. Coming up with a good password requires moving around the keyboard a bit more.

Lisa Kudrow

Lisa Kudrow sitting at a restaurant in a scene from a film.
2015 Twentieth Century Fox Film Corporation

Friend’s actress, Lisa Kudrow accidentally doxed herself in 2019 when she uploaded a photo to her Twitter which included a sticky note with the password to her account.

This one isn’t technically a hack or someone guessing an easy password. But let it serve as a reminder to not store your passwords on sticky notes or on easily accessible online documents. Choose a reliable password manager, and you’ll never accidentally have this problem.

Evan Williams

Former Twitter CEO Evan Williams wearing a blue shirt.
Image used with permission by copyright holder

The former Twitter CEO had his own Twitter account hacked in 2016 after bad actors guessed his Foursquare password and figured out, he was reusing the same password for his social media account.

Another easy lesson for this one. Don’t reuse the same password for every account you have online. Again, password managers will fix this easily, but this is the most dangerous way to leave yourself vulnerable.

2020 Twitter account hijacking

Democratic Presidential Candidate Joe Biden Campaigns In Iowa
Chip Somodevilla/Getty Images

President Joe Biden and former President Barack Obama were affected by a Twitter hacking scam in 2020, in which bad actors infiltrated the accounts of several notable people. After accessing the Twitter accounts, hackers sent out tweets posing as charitable donations in the form of Bitcoin due to the COVID-19 pandemic, urging people to send sums of Bitcoin in order to receive that amount doubled.

Victims who sent Bitcoin of course never received any reward in return and the bad actors were able to get away with over $100,000. Meanwhile, over 130 celebrity Twitter accounts were affected by the scam including Kim Kardashian and Kanye West.

Ultimately, investigations determined that the hackers used administrative tools to bypass account security, so the actual celebrities were unable to protect themselves. However, this was once again a case where many celebrities were using the same password across multiple accounts, still leaving them vulnerable.

Celebgate

The massive iCloud hack known as “Celebgate” took place between 2014 and 2017 and affected nearly 100 famous women, including Rihanna, Scarlett Johansson, and Ariana Grande, whose private images were shared across the internet.

The hack was able to take place at that time because, in 2014, Apple did not lock accounts that had repeated login attempts take place. So, one method that bad actors tried was simply attempting to guess passwords over and over. Another method was attempting to find a weakness within Apple’s software, which they did in the find my iPhone app. They used this to find celebrities’ Apple IDs and email addresses and use these to send phishing emails requesting confirmation of usernames and passwords.

Emails would be sent from addresses such as appleprivacysecurity and text and format would be identical to those actually sent by Apple. Unsuspecting celebrities would input their Apple login information and send it directly to hackers.

During “Celebgate,” over 500 compromising photos were distributed online, first to the image board 4Chan, and then to other social media websites such as Imgur and Reddit.

Ways cybercriminals can access passwords

There are many ways hackers can access security information such as passwords or bypass passwords altogether to access accounts. Some popular methods include data breaches and malware or ransomware. However, there are other methods, when used on their own or combined with the aforementioned attacks can take bad actors directly to the passwords they desire.

Brute force attacks: Hackers might attempt to guess your password using software programs containing common password configurations. Notably, in recent times, cybersecurity researchers have been studying the PassGAN tool, which uses AI to crack common four- to seven-character passwords in seconds. The tool was trained on a data set that has collected information from popular breaches of companies over several years.

Social engineering: Hackers might attempt to guess your password based on your personal information, either attempting to trick you into divulging details or searching social media or other profiles for clues about your password. These might include your address, your name, family names, or birthday, among others. This is similar to the Donald Trump and Paris Hilton attacks.

Phishing scams: Hackers might attempt to send emails that look similar to legitimate businesses and interacting with links or inputting your personal information can send your data directly to bad actors. This is similar to the Celebgate attack. Phishing attacks can also unintentionally install malware onto a device, which then remotely gives hackers access to passwords.

Tips for keeping your password safe

One overarching theme of many of these hacks was that the public figures involved did not have the best password practices. However, many of us follow in their footsteps. Here are some tips you can use to keep your passwords safe.

  • Avoid using easy-to-guess passwords.
  • Spend a bit more time developing a unique password.
  • Use a password manager.
  • Don’t use the same password on multiple platforms.
  • Remember that companies will never ask for your password.
  • Implement 2-step verification on a device or service.
  • Be wary of phishing scams, and keep company email addresses starred or in your address book from prior interactions so that you’re familiar with them.
Fionna Agomuoh
Fionna Agomuoh is a Computing Writer at Digital Trends. She covers a range of topics in the computing space, including…
Google is cracking down on internet security in this big way
Connection is not private warning from Google.

Google is making some serious changes to digital certificate security on the web, the company announced on its Security blog. The big news is that Google will no longer trust certificates from two large security firms -- Entrust or AffirmTrust -- due to repeated security lapses.

According to Google, the companies, which are Certificate Authorities (CA), have demonstrated patterns of unmet improvement commitments, compliance failures, and no measurable progress in how fast the company responds to publicly disclosed incident reports.

Read more
Hacker claims to have hit Apple days after hacking AMD
The Apple logo is displayed at the Apple Store June 17, 2015 on Fifth Avenue in New York City

Data breaches happen all the time, but when the giants get hit, it's impossible not to wonder what kind of critical data may become exposed. Earlier this week, notorious cybercriminal Intelbroker reported that they managed to hack AMD. Now, they followed up with claims about hacking Apple, and went as far as to share some internal source code on a hacking forum.

As Apple has yet to comment, all we have to go off is the forum post, first shared by HackManac on X (formerly Twitter). In the post, Intelbroker states that Apple suffered a data breach that led to the exposure of the source code for some of its internal tools. The tools include AppleConnect-SSO, Apple-HWE-Confluence-Advanced. There's been no mention of any customer data being leaked, which is good news, but there could still be some impact on Apple if this proves to be true.

Read more
5 password managers you should use instead of LastPass
A person using the 1Password password manager on a laptop while sat on a couch.

When it comes to securing your passwords, LastPass has been one of the top contenders as the best password manager. However, a recent set of high-profile security incidents has made a lot of people a lot less willing to trust it.

If you’re looking for an alternative to LastPass, you’re in the right place. We’ve found five superb password managers that can keep you safe online without the hassle.
1Password

Read more