Pretty in pink! Rebel Wilson shows off her slimmed-down figure and trim waist in a fuchsia jumpsuit as she parties on the beachĪngelina Jolie enjoys a relaxed chat with daughter Shiloh, 15, as star goes for scenic stroll with her children in Rome One hacker interviewed by the Times said he had heard rumors that 'Kirk' gained access to an internal Twitter Slack channel where he saw user credentials posted. Though 'Kirk' originally claimed to work for Twitter, 'lol' came to doubt the claim after seeing the damage he was willing to inflict on the company. More than $100,000 worth of bitcoin was sent to email addresses mentioned in the tweets, according to, which monitors crypto transactions. The fraudulent posts, which were largely deleted quickly, said people had 30 minutes to send $1,000 in bitcoin, promising they would receive twice as much in return. 'ever so anxious' was able to gain control of the Twitter account he had long coveted, which now displays his contact info in the bio, according to the TimesĪfter their initial scheme saw modest success, bringing in thousands of dollars, 'lol' and 'ever so anxious' claimed to the Times that 'Kirk' went rogue, hijacking high-profile accounts and posting requests to send bitcoin to the wallet address that 'Kirk' had also used to receive payment for the OG names. 'Ever so anxious' said he was 19 and lived in the south of England with his mother.Īfter 'Kirk' proved that he had the ability to take over any Twitter account, the group began hijacking and selling coveted OG usernames, including which 'ever so anxious' had long desired. The user 'lol' did not confirm his real-world identity to the Times, but said he lived on the West Coast and was in his 20s. 'Kirk' convinced two other young people, who go by the monikers 'lol' and 'ever so anxious' to act as brokers for the sale of OG names, and the two posted an ad on the forum, where they are well known, according to the Times. Such accounts are highly coveted by hackers and gamers. 'Kirk' offered to hijack coveted 'OG accounts' and proposed that the group could sell them. OG, short for 'original gangster', accounts consist of a username with single character or short word, such as or which would have been created early in Twitter's history. The attack unfolded when a mysterious ringleader, known by the username 'Kirk', first approached other participants online late on Tuesday, claiming that he worked at Twitter and showing off his ability to hijack accounts, according to Times interviews with four people connected with the scheme.