Crypto security experts have identified a recently emerged, sophisticated phishing campaign targeting prominent figures on X (formerly Twitter). Unlike traditional scams, this campaign employs advanced tactics that bypass two-factor authentication, making it particularly dangerous. The attack leverages X’s own infrastructure to gain unauthorized access to high-profile accounts, raising concerns about emerging vulnerabilities within social media [...]Crypto security experts have identified a recently emerged, sophisticated phishing campaign targeting prominent figures on X (formerly Twitter). Unlike traditional scams, this campaign employs advanced tactics that bypass two-factor authentication, making it particularly dangerous. The attack leverages X’s own infrastructure to gain unauthorized access to high-profile accounts, raising concerns about emerging vulnerabilities within social media [...]

Crypto Community Underattack: New X Account Takeover Threat

Crypto Community Underattack: New X Account Takeover Threat

Crypto security experts have identified a recently emerged, sophisticated phishing campaign targeting prominent figures on X (formerly Twitter). Unlike traditional scams, this campaign employs advanced tactics that bypass two-factor authentication, making it particularly dangerous. The attack leverages X’s own infrastructure to gain unauthorized access to high-profile accounts, raising concerns about emerging vulnerabilities within social media platforms used heavily by the crypto community.

  • A new phishing campaign targets crypto personalities’ X accounts by exploiting X’s infrastructure to bypass two-factor authentication.
  • The attack uses convincing messaging and metadata tricks, creating highly credible phishing links mimicking Google Calendar.
  • Experts warn that the campaign could be part of a broader effort to compromise social media accounts in the crypto sector.
  • The scam involves a fake authorization request that demands extensive account permissions, raising suspicion among vigilant users.
  • Recommendations include revoking suspicious connected apps and carefully examining unusual permission requests to prevent account compromise.

A new wave of phishing campaigns is targeting the social media accounts of industry figures within the cryptocurrency community, posing an increasing threat in the digital asset ecosystem. These scams have demonstrated the ability to sidestep two-factor authentication, utilizing X’s own infrastructure for account takeover. This method underscores the evolving sophistication of attack vectors aimed at crypto influencers and traders, whose accounts often hold significant value in the market.

As reported by crypto developer Zak Cole, the attack does not rely on conventional means like fake login pages or password theft. Instead, it exploits support features within the X app itself, stealing account control without requiring the victim’s password or 2FA. This has prompted a warning from security researchers and prompted calls for heightened vigilance. MetaMask security researcher Ohm Shah confirmed seeing the attack active “in the wild,” indicating a potentially wide-ranging campaign, with a less sophisticated version targeting an OnlyFans model.

Crafting a convincing phishing message

The campaign’s standout feature is its ability to appear authentic. Attackers initiate contact through direct messages containing links that seem to direct users to legitimate services. The links appear to lead to the Google Calendar domain, thanks to how X generates post previews using metadata. In reality, the link directs to a domain registered as “x(.)ca-lendar(.)com,” registered only days prior, but the preview shows the familiar Google Calendar URL, tricking users into trusting the link.

Once clicked, the link redirects to an X authorization page requesting permission for an app called “Calendar” to access the account. Closer inspection reveals the app’s name includes two Cyrillic characters that resemble Latin “a” and “e,” a subtle trick designed to evade detection. The authorization request then prompts users to grant extensive permissions, including following accounts, posting, editing profile info, and more—all of which are suspicious for a calendar app.

Fake authorization request for the phishing app. Source: Zak Cole

Detecting the signs of a phishing attack

One of the most subtle signs of the scam is a fleeting appearance of the URL—likely visible for only a moment before redirection—making it easy to overlook. However, a key indicator is the scope of requested permissions. The app seeks control over nearly every aspect of the account—from posting to managing followers—which is highly unusual for a calendar app.

Adding to the suspicion, users are redirected to Calendly.com after granting permission, revealing an inconsistency that should prompt skepticism. “They spoofed Google Calendar but redirected to Calendly? Operational security failure,” Cole noted. To prevent account compromise, he recommends reviewing connected apps on X’s settings page and revoking any called “Calendar,” especially those that seem suspicious.

This attack’s complexity illustrates the importance of maintaining a cautious stance towards social media permissions, especially within the cryptocurrency sphere where influential accounts can significantly sway market sentiment. As crypto markets remain volatile, securing these digital assets from social engineering tactics is more critical than ever.

This article was originally published as Crypto Community Underattack: New X Account Takeover Threat on Crypto Breaking News – your trusted source for crypto news, Bitcoin news, and blockchain updates.

Market Opportunity
Griffin AI Logo
Griffin AI Price(GAIN)
$0.00303
$0.00303$0.00303
+0.26%
USD
Griffin AI (GAIN) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

IP Hits $11.75, HYPE Climbs to $55, BlockDAG Surpasses Both with $407M Presale Surge!

IP Hits $11.75, HYPE Climbs to $55, BlockDAG Surpasses Both with $407M Presale Surge!

The post IP Hits $11.75, HYPE Climbs to $55, BlockDAG Surpasses Both with $407M Presale Surge! appeared on BitcoinEthereumNews.com. Crypto News 17 September 2025 | 18:00 Discover why BlockDAG’s upcoming Awakening Testnet launch makes it the best crypto to buy today as Story (IP) price jumps to $11.75 and Hyperliquid hits new highs. Recent crypto market numbers show strength but also some limits. The Story (IP) price jump has been sharp, fueled by big buybacks and speculation, yet critics point out that revenue still lags far behind its valuation. The Hyperliquid (HYPE) price looks solid around the mid-$50s after a new all-time high, but questions remain about sustainability once the hype around USDH proposals cools down. So the obvious question is: why chase coins that are either stretched thin or at risk of retracing when you could back a network that’s already proving itself on the ground? That’s where BlockDAG comes in. While other chains are stuck dealing with validator congestion or outages, BlockDAG’s upcoming Awakening Testnet will be stress-testing its EVM-compatible smart chain with real miners before listing. For anyone looking for the best crypto coin to buy, the choice between waiting on fixes or joining live progress feels like an easy one. BlockDAG: Smart Chain Running Before Launch Ethereum continues to wrestle with gas congestion, and Solana is still known for network freezes, yet BlockDAG is already showing a different picture. Its upcoming Awakening Testnet, set to launch on September 25, isn’t just a demo; it’s a live rollout where the chain’s base protocols are being stress-tested with miners connected globally. EVM compatibility is active, account abstraction is built in, and tools like updated vesting contracts and Stratum integration are already functional. Instead of waiting for fixes like other networks, BlockDAG is proving its infrastructure in real time. What makes this even more important is that the technology is operational before the coin even hits exchanges. That…
Share
BitcoinEthereumNews2025/09/18 00:32
Academic Publishing and Fairness: A Game-Theoretic Model of Peer-Review Bias

Academic Publishing and Fairness: A Game-Theoretic Model of Peer-Review Bias

Exploring how biases in the peer-review system impact researchers' choices, showing how principles of fairness relate to the production of scientific knowledge based on topic importance and hardness.
Share
Hackernoon2025/09/17 23:15
Hadron Labs Launches Bitcoin Summer on Neutron, Offering 5–10% BTC Yield

Hadron Labs Launches Bitcoin Summer on Neutron, Offering 5–10% BTC Yield

Hadron Labs launches 'Bitcoin Summer' on Neutron, BTC vaults for WBTC, eBTC, solvBTC, uniBTC and USDC. Earn 5–10% BTC via maxBTC, with up to 10x looping.
Share
Blockchainreporter2025/09/18 02:00