{
    "id": 49210,
    "date": "2025-09-25T18:08:29",
    "date_gmt": "2025-09-25T11:08:29",
    "guid": {
        "rendered": "https:\/\/hbbgroup.net\/new-advanced-x-account-takeover-attack-targets-crypto-community\/"
    },
    "modified": "2025-09-25T18:08:29",
    "modified_gmt": "2025-09-25T11:08:29",
    "slug": "new-advanced-x-account-takeover-attack-targets-crypto-community",
    "status": "publish",
    "type": "post",
    "link": "https:\/\/hbbgroup.net\/en_us\/new-advanced-x-account-takeover-attack-targets-crypto-community\/",
    "title": {
        "rendered": "New advanced X account takeover attack targets crypto community"
    },
    "content": {
        "rendered": "<div data-v-43e640e6>\n<p>A new sophisticated phishing campaign is targeting the X accounts of crypto personalities, using tactics that bypass two-factor authentication and appear more credible than traditional scams.<\/p>\n<p>According to a Wednesday X <a href=\"https:\/\/x.com\/0xzak\/status\/1970878159471182051\" rel=\"nofollow noopener\" target=\"_blank\" title=\"https:\/\/x.com\/0xzak\/status\/1970878159471182051\">post<\/a> by crypto developer Zak Cole, a new <a href=\"https:\/\/cointelegraph.com\/learn\/articles\/what-is-a-phishing-attack-in-crypto-and-how-to-prevent-it\" rel target=\"_self\" title=\"https:\/\/cointelegraph.com\/learn\/articles\/what-is-a-phishing-attack-in-crypto-and-how-to-prevent-it\">phishing campaign<\/a> leverages X\u2019s own infrastructure to take over the accounts of crypto personalities. \u201cZero detection. Active right now. Full account takeover,\u201d he said.<\/p>\n<p>Cole highlighted that the attack does not involve a fake login page or password stealing. Instead, it leverages X application support to gain account access while also <a href=\"https:\/\/cointelegraph.com\/learn\/articles\/what-is-two-factor-authentication-2fa\" rel target=\"_self\" title=\"https:\/\/cointelegraph.com\/learn\/articles\/what-is-two-factor-authentication-2fa\">bypassing two-factor authentication<\/a>.<\/p>\n<p><a href=\"https:\/\/cointelegraph.com\/learn\/articles\/metamask-tutorial-for-beginners-how-to-set-up-a-metamask-wallet\" rel target=\"_self\" title=\"https:\/\/cointelegraph.com\/learn\/articles\/metamask-tutorial-for-beginners-how-to-set-up-a-metamask-wallet\">MetaMask<\/a> security researcher Ohm Shah <a href=\"https:\/\/x.com\/0xOhm_eth\/status\/1970896794990321725\" rel=\"nofollow noopener\" target=\"_blank\" title=\"https:\/\/x.com\/0xOhm_eth\/status\/1970896794990321725\">confirmed<\/a> seeing the attack \u201cin the wild,\u201d suggesting a broader campaign, and an OnlyFans model was also <a href=\"https:\/\/x.com\/Alinity\/status\/1970575191685357681\" rel=\"nofollow noopener\" target=\"_blank\" title=\"https:\/\/x.com\/Alinity\/status\/1970575191685357681\">targeted<\/a> by a less sophisticated version of the attack.<\/p>\n<p><em><strong>Related: <\/strong><\/em><a href=\"https:\/\/cointelegraph.com\/news\/blockstream-sounds-alarm-email-phishing-campaign\" rel target=\"_self\" title=\"https:\/\/cointelegraph.com\/news\/blockstream-sounds-alarm-email-phishing-campaign\"><em><strong>Blockstream sounds the alarm on new email phishing campaign<\/strong><\/em><\/a><\/p>\n<h2>Crafting a credible phishing message<\/h2>\n<p>The notable feature of the phishing campaign is how credible and discreet it is. The attack begins with an X direct message containing a link that appears to redirect to the official Google Calendar domain, thanks to how the social media platform generates its previews. In the case of Cole, the message pretended to be coming from a representative of venture capital firm Andreessen Horowitz.<\/p>\n<figure><img decoding=\"async\" alt src=\"https:\/\/s3.cointelegraph.com\/uploads\/2025-09\/01997ff9-5875-7741-aeff-1218a3a5c80e\" title><figcaption><em>The phishing link is in the message. Source: <\/em><a href=\"https:\/\/x.com\/0xzak\/status\/1970878182619541610\/photo\/2\" rel=\"nofollow noopener\" target=\"_blank\" title=\"https:\/\/x.com\/0xzak\/status\/1970878182619541610\/photo\/2\"><em>Zak Cole<\/em><\/a><\/figcaption><\/figure>\n<p>The domain that the message links to is \u201cx(.)ca-lendar(.)com\u201d and was registered on Saturday. Still, X shows the legitimate calendar.google.com in the preview thanks to the site\u2019s metadata exploiting how X generates previews from its metadata.<\/p>\n<blockquote data-ct-non-breakable=\"undefined\"><p>\u201cYour brain sees Google Calendar. The URL is different.\u201c<\/p><\/blockquote>\n<figure><img decoding=\"async\" alt src=\"https:\/\/s3.cointelegraph.com\/uploads\/2025-09\/01998003-41d5-7430-9232-038a4e516295\" title><figcaption><em>Phishing site\u2019s metadata. Source: <\/em><a href=\"https:\/\/x.com\/0xzak\/status\/1970878304967344253\/photo\/1\" rel=\"nofollow noopener\" target=\"_blank\" title=\"https:\/\/x.com\/0xzak\/status\/1970878304967344253\/photo\/1\"><em>Zak Cole<\/em><\/a><\/figcaption><\/figure>\n<p>When clicked, the page\u2019s JavaScript redirects to an X authentication endpoint requesting authorization for an app to access your social media account. The app appears to be \u201cCalendar,\u201d but technical examination of the text reveals that the application\u2019s name contains two Cyrillic characters looking like an \u201ca\u201d and an \u201ce,\u201d making it a distinct app compared to the actual \u201cCalendar\u201d app in X\u2019s system.<\/p>\n<figure><img decoding=\"async\" alt src=\"https:\/\/s3.cointelegraph.com\/uploads\/2025-09\/01998017-466b-7d84-a12f-3e4fc51c905d\" title><figcaption><em>Phishing X authorization request. Source: <\/em><a href=\"https:\/\/x.com\/0xzak\/status\/1970878233299317216\/photo\/1\" rel=\"nofollow noopener\" target=\"_blank\" title=\"https:\/\/x.com\/0xzak\/status\/1970878233299317216\/photo\/1\"><em>Zak Cole<\/em><\/a><\/figcaption><\/figure>\n<p><em><strong>Related: <\/strong><\/em><a href=\"https:\/\/cointelegraph.com\/news\/phishing-scams-cost-users-12m-august-stay-safe\" rel target=\"_self\" title=\"https:\/\/cointelegraph.com\/news\/phishing-scams-cost-users-12m-august-stay-safe\"><em><strong>Phishing scams cost users over $12M in August \u2014 Here\u2019s how to stay safe<\/strong><\/em><\/a><\/p>\n<h2>The hint revealing the attack<\/h2>\n<p>So far, the most obvious sign that the link was not legitimate may have been the URL that briefly appeared before the user was redirected. This likely appeared for only a fraction of a second and is easy to miss.<\/p>\n<p>Still, on the X authentication page, we find the first hint that this is a phishing attack. The app requests a long list of comprehensive account control permissions, including following and unfollowing accounts, updating profiles and account settings, creating and deleting posts, engaging with posts by others, and more.<\/p>\n<p>Those permissions seem unnecessary for a calendar app and may be the hint that saves a careful user from the attack. If permission is granted, the attackers gain access to the account as the users are given another hint with a redirection to calendly.com despite the Google Calendar preview.<\/p>\n<p>\u201cCalendly? They spoofed Google Calendar, but redirect to Calendly? Major operational security failure. This inconsistency could tip off victims,\u201d Cole highlighted.<\/p>\n<p>According to Cole\u2019s GitHub <a href=\"https:\/\/github.com\/zscole\/twitter-oauth-unicode-phishing\" rel=\"nofollow noopener\" target=\"_blank\" title=\"https:\/\/github.com\/zscole\/twitter-oauth-unicode-phishing\">report<\/a> on the attack, to check if your profile was compromised and oust the attackers from the account, it is recommended that you visit the X connected apps <a href=\"https:\/\/twitter.com\/settings\/connected_apps\" rel=\"nofollow noopener\" target=\"_blank\" title=\"https:\/\/twitter.com\/settings\/connected_apps\">page<\/a>. Then he suggests revoking any apps named \u201cCalendar.\u201d <\/p>\n<p><em><strong>Magazine: <\/strong><\/em><a href=\"https:\/\/cointelegraph.com\/magazine\/jd-stablecoins-fake-crypto-sleuths-probe-ex-first-lady-asia-express\/\" rel target=\"_self\" title=\"https:\/\/cointelegraph.com\/magazine\/jd-stablecoins-fake-crypto-sleuths-probe-ex-first-lady-asia-express\/\"><em><strong>Fake JD stablecoins, scammers impersonate Solana devs: Asia Express<\/strong><\/em><\/a><\/p>\n<p><template data-name=\"subscription_form\" data-type=\"markets_outlook\" label=\"Subscription Form: Markets Outlook\"><\/template><\/div>",
        "protected": false
    },
    "excerpt": {
        "rendered": "<p>A new sophisticated phishing campaign is targeting the X accounts of crypto personalities, using tactics that bypass two-factor authentication and [&hellip;]<\/p>",
        "protected": false
    },
    "author": 5,
    "featured_media": 49211,
    "comment_status": "open",
    "ping_status": "open",
    "sticky": false,
    "template": "",
    "format": "standard",
    "meta": {
        "_acf_changed": false,
        "footnotes": ""
    },
    "categories": [
        220
    ],
    "tags": [],
    "class_list": [
        "post-49210",
        "post",
        "type-post",
        "status-publish",
        "format-standard",
        "has-post-thumbnail",
        "hentry",
        "category-tien-dien-tu"
    ],
    "acf": [],
    "_links": {
        "self": [
            {
                "href": "https:\/\/hbbgroup.net\/en_us\/wp-json\/wp\/v2\/posts\/49210",
                "targetHints": {
                    "allow": [
                        "GET"
                    ]
                }
            }
        ],
        "collection": [
            {
                "href": "https:\/\/hbbgroup.net\/en_us\/wp-json\/wp\/v2\/posts"
            }
        ],
        "about": [
            {
                "href": "https:\/\/hbbgroup.net\/en_us\/wp-json\/wp\/v2\/types\/post"
            }
        ],
        "author": [
            {
                "embeddable": true,
                "href": "https:\/\/hbbgroup.net\/en_us\/wp-json\/wp\/v2\/users\/5"
            }
        ],
        "replies": [
            {
                "embeddable": true,
                "href": "https:\/\/hbbgroup.net\/en_us\/wp-json\/wp\/v2\/comments?post=49210"
            }
        ],
        "version-history": [
            {
                "count": 0,
                "href": "https:\/\/hbbgroup.net\/en_us\/wp-json\/wp\/v2\/posts\/49210\/revisions"
            }
        ],
        "wp:featuredmedia": [
            {
                "embeddable": true,
                "href": "https:\/\/hbbgroup.net\/en_us\/wp-json\/wp\/v2\/media\/49211"
            }
        ],
        "wp:attachment": [
            {
                "href": "https:\/\/hbbgroup.net\/en_us\/wp-json\/wp\/v2\/media?parent=49210"
            }
        ],
        "wp:term": [
            {
                "taxonomy": "category",
                "embeddable": true,
                "href": "https:\/\/hbbgroup.net\/en_us\/wp-json\/wp\/v2\/categories?post=49210"
            },
            {
                "taxonomy": "post_tag",
                "embeddable": true,
                "href": "https:\/\/hbbgroup.net\/en_us\/wp-json\/wp\/v2\/tags?post=49210"
            }
        ],
        "curies": [
            {
                "name": "wp",
                "href": "https:\/\/api.w.org\/{rel}",
                "templated": true
            }
        ]
    }
}