Barcelona Twitter accounts hacked after league win | Inquirer Sports

Barcelona Twitter accounts hacked after league win

/ 02:00 PM February 16, 2020

Barcelona

Barcelona players wearing Ousmane Dembele shirts in support of their seriously injured team mate shake hands with Getafe players in the company of boys and girls of Chinese origin from the Penya Dracs Units Xinesos, the Chinese FC Barcalona supporters club based in Barcelona, wearing a shirt with the message Stronger Together in English and “Support for China” in Chinese. during a Spanish La Liga soccer match between Barcelona and Getafe at the Camp Nou stadium in Barcelona, Spain, Saturday Feb. 15, 2020. (AP Photo/G.Garin)

BARCELONA, Spain — Barcelona’s Twitter accounts were hacked after the team’s 2-1 home win over Getafe in the Spanish league on Saturday.

A group calling itself “OurMine” took over Barcelona’s accounts and posted a fake image hinting that the club had re-signed Brazilian forward Neymar.

ADVERTISEMENT

It also posted a message noting that it was the second time it had hacked the club. It said that “the security level is better but still not the best,” and added information on how it could be contacted to help “improve” the accounts’ security.

FEATURED STORIES

The messages were later deleted and Barcelona eventually retook control of its accounts.

The group had also hacked Barcelona in 2017.

Some of the Twitter accounts belonging to the International Olympic Committee also were hacked by the same group on Saturday, with similar messages.

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our daily newsletter

By providing an email address. I agree to the Terms of Use and acknowledge that I have read the Privacy Policy.

TAGS: Barca, Barcelona, Football, Getafe, hacked, Spanish League, Twitter

© Copyright 1997-2024 INQUIRER.net | All Rights Reserved

We use cookies to ensure you get the best experience on our website. By continuing, you are agreeing to our use of cookies. To find out more, please click this link.