The post New X Account Takeover Attack Targets Crypto Community appeared on BitcoinEthereumNews.com. A new sophisticated phishing campaign is targeting the X accounts of crypto personalities, using tactics that bypass two-factor authentication and appear more credible than traditional scams. According to a Wednesday X post by crypto developer Zak Cole, a new phishing campaign leverages X’s own infrastructure to take over the accounts of crypto personalities. “Zero detection. Active right now. Full account takeover,” he said. Cole highlighted that the attack does not involve a fake login page or password stealing. Instead, it leverages X application support to gain account access while also bypassing two-factor authentication. MetaMask security researcher Ohm Shah confirmed seeing the attack “in the wild,” suggesting a broader campaign, and an OnlyFans model was also targeted by a less sophisticated version of the attack. Related: Blockstream sounds the alarm on new email phishing campaign Crafting a credible phishing message The notable feature of the phishing campaign is how credible and discreet it is. The attack begins with an X direct message containing a link that appears to redirect to the official Google Calendar domain, thanks to how the social media platform generates its previews. In the case of Cole, the message pretended to be coming from a representative of venture capital firm Andreessen Horowitz. The phishing link is in the message. Source: Zak Cole The domain that the message links to is “x(.)ca-lendar(.)com” and was registered on Saturday. Still, X shows the legitimate calendar.google.com in the preview thanks to the site’s metadata exploiting how X generates previews from its metadata. “Your brain sees Google Calendar. The URL is different.“ Phishing site’s metadata. Source: Zak Cole When clicked, the page’s JavaScript redirects to an X authentication endpoint requesting authorization for an app to access your social media account. The app appears to be “Calendar,” but technical examination of the text reveals… The post New X Account Takeover Attack Targets Crypto Community appeared on BitcoinEthereumNews.com. A new sophisticated phishing campaign is targeting the X accounts of crypto personalities, using tactics that bypass two-factor authentication and appear more credible than traditional scams. According to a Wednesday X post by crypto developer Zak Cole, a new phishing campaign leverages X’s own infrastructure to take over the accounts of crypto personalities. “Zero detection. Active right now. Full account takeover,” he said. Cole highlighted that the attack does not involve a fake login page or password stealing. Instead, it leverages X application support to gain account access while also bypassing two-factor authentication. MetaMask security researcher Ohm Shah confirmed seeing the attack “in the wild,” suggesting a broader campaign, and an OnlyFans model was also targeted by a less sophisticated version of the attack. Related: Blockstream sounds the alarm on new email phishing campaign Crafting a credible phishing message The notable feature of the phishing campaign is how credible and discreet it is. The attack begins with an X direct message containing a link that appears to redirect to the official Google Calendar domain, thanks to how the social media platform generates its previews. In the case of Cole, the message pretended to be coming from a representative of venture capital firm Andreessen Horowitz. The phishing link is in the message. Source: Zak Cole The domain that the message links to is “x(.)ca-lendar(.)com” and was registered on Saturday. Still, X shows the legitimate calendar.google.com in the preview thanks to the site’s metadata exploiting how X generates previews from its metadata. “Your brain sees Google Calendar. The URL is different.“ Phishing site’s metadata. Source: Zak Cole When clicked, the page’s JavaScript redirects to an X authentication endpoint requesting authorization for an app to access your social media account. The app appears to be “Calendar,” but technical examination of the text reveals…

New X Account Takeover Attack Targets Crypto Community

2025/09/26 08:32
3분 읽기
이 콘텐츠에 대한 의견이나 우려 사항이 있으시면 crypto.news@mexc.com으로 연락주시기 바랍니다

A new sophisticated phishing campaign is targeting the X accounts of crypto personalities, using tactics that bypass two-factor authentication and appear more credible than traditional scams.

According to a Wednesday X post by crypto developer Zak Cole, a new phishing campaign leverages X’s own infrastructure to take over the accounts of crypto personalities. “Zero detection. Active right now. Full account takeover,” he said.

Cole highlighted that the attack does not involve a fake login page or password stealing. Instead, it leverages X application support to gain account access while also bypassing two-factor authentication.

MetaMask security researcher Ohm Shah confirmed seeing the attack “in the wild,” suggesting a broader campaign, and an OnlyFans model was also targeted by a less sophisticated version of the attack.

Related: Blockstream sounds the alarm on new email phishing campaign

Crafting a credible phishing message

The notable feature of the phishing campaign is how credible and discreet it is. The attack begins with an X direct message containing a link that appears to redirect to the official Google Calendar domain, thanks to how the social media platform generates its previews. In the case of Cole, the message pretended to be coming from a representative of venture capital firm Andreessen Horowitz.

The phishing link is in the message. Source: Zak Cole

The domain that the message links to is “x(.)ca-lendar(.)com” and was registered on Saturday. Still, X shows the legitimate calendar.google.com in the preview thanks to the site’s metadata exploiting how X generates previews from its metadata.

Phishing site’s metadata. Source: Zak Cole

When clicked, the page’s JavaScript redirects to an X authentication endpoint requesting authorization for an app to access your social media account. The app appears to be “Calendar,” but technical examination of the text reveals that the application’s name contains two Cyrillic characters looking like an “a” and an “e,” making it a distinct app compared to the actual “Calendar” app in X’s system.

Phishing X authorization request. Source: Zak Cole

Related: Phishing scams cost users over $12M in August — Here’s how to stay safe

The hint revealing the attack

So far, the most obvious sign that the link was not legitimate may have been the URL that briefly appeared before the user was redirected. This likely appeared for only a fraction of a second and is easy to miss.

Still, on the X authentication page, we find the first hint that this is a phishing attack. The app requests a long list of comprehensive account control permissions, including following and unfollowing accounts, updating profiles and account settings, creating and deleting posts, engaging with posts by others, and more.

Those permissions seem unnecessary for a calendar app and may be the hint that saves a careful user from the attack. If permission is granted, the attackers gain access to the account as the users are given another hint with a redirection to calendly.com despite the Google Calendar preview.

“Calendly? They spoofed Google Calendar, but redirect to Calendly? Major operational security failure. This inconsistency could tip off victims,” Cole highlighted.

According to Cole’s GitHub report on the attack, to check if your profile was compromised and oust the attackers from the account, it is recommended that you visit the X connected apps page. Then he suggests revoking any apps named “Calendar.”

Magazine: Fake JD stablecoins, scammers impersonate Solana devs: Asia Express

Source: https://cointelegraph.com/news/new-advanced-x-account-takeover-attack-targets-crypto-community?utm_source=rss_feed&utm_medium=feed&utm_campaign=rss_partner_inbound

시장 기회
Moonveil 로고
Moonveil 가격(MORE)
$0.00003505
$0.00003505$0.00003505
-0.65%
USD
Moonveil (MORE) 실시간 가격 차트
면책 조항: 본 사이트에 재게시된 글들은 공개 플랫폼에서 가져온 것으로 정보 제공 목적으로만 제공됩니다. 이는 반드시 MEXC의 견해를 반영하는 것은 아닙니다. 모든 권리는 원저자에게 있습니다. 제3자의 권리를 침해하는 콘텐츠가 있다고 판단될 경우, crypto.news@mexc.com으로 연락하여 삭제 요청을 해주시기 바랍니다. MEXC는 콘텐츠의 정확성, 완전성 또는 시의적절성에 대해 어떠한 보증도 하지 않으며, 제공된 정보에 기반하여 취해진 어떠한 조치에 대해서도 책임을 지지 않습니다. 본 콘텐츠는 금융, 법률 또는 기타 전문적인 조언을 구성하지 않으며, MEXC의 추천이나 보증으로 간주되어서는 안 됩니다.

USD1 Genesis: 0 Fees + 12% APR

USD1 Genesis: 0 Fees + 12% APRUSD1 Genesis: 0 Fees + 12% APR

New users: stake for up to 600% APR. Limited time!