Connect with us

Hi, what are you looking for?

X twitter account hack attack new advanced
X twitter account hack attack new advanced

News

Phishing Plan for Crypto Influencer X Exploits 2FA Bypass

A sophisticated phishing attack targets crypto influencers on X using 2FA bypass via fake Google Calendar links.

💻 Bitcoin Accounts Targeted via Phishing, Says Yuga Labs

A new phishing campaign is targeting the X accounts of crypto influencers. Attackers bypass 2FA, gaining full control of user accounts.

Crypto developer Zak Cole warns the attack exploits X’s own tools to hijack accounts.

“Zero detection. Active right now. Full account takeover,” Cole said.

Unlike traditional phishing scams, this attack does not use a fake page to steal credentials. Instead, it manipulates the application authorization system of X.

MetaMask security expert Ohm Shah confirmed seeing the campaign “in the wild,” indicating multiple high-profile accounts are targeted.


⚙️ How the Phishing Campaign Works

The phishing begins with a message containing a link resembling a Google Calendar redirect, but it actually points to a fake URL: x(.)ca-lendar(.)com. X previews metadata, making the link look legitimate.

“Your brain sees Google Calendar. The URL is different,” Cole explained.

Clicking the link directs the user to an X authentication endpoint requesting app authorization for a calendar app. The app name uses subtle Cyrillic characters, technically differing from the genuine “Calendar” app in X’s system.

Also Read : Bank of Canada Calls to Regulate Stablecoins to Keep Canada a Leader in Payments


⚠️ Warning Signs to Watch

The phishing app requests unnecessary permissions, such as:

  • Following or unfollowing accounts
  • Updating profiles and account settings
  • Creating and deleting posts
  • Engaging with other users’ posts

These permissions indicate attackers can gain full control of compromised accounts.

Additionally, once authorized, users are redirected to Calendly instead of Google Calendar, signaling a scam.


How to Protect Yourself

Zak Cole recommends:

  • Reviewing your X connected apps page
  • Revoking suspicious applications, especially those named “Calendar”
  • Ensuring no unauthorized apps have access to your account

This attack highlights the increasing sophistication of phishing tactics targeting top crypto personalities. Vigilance with app permissions is crucial to safeguarding accounts.

author avatar
June
June is a sharp-eyed journalist at 4Cby360, blending a passion for global finance and emerging tech with a knack for clear, insightful storytelling. From crypto trends to market shifts, June delivers unbiased, well-researched news that keeps readers informed and ahead of the curve.
Advertisement

You May Also Like

Cryptocurrency

Indonesia’s Financial Services Authority (OJK) has released a definitive list of licensed crypto exchanges in Indonesia, providing traders with a trusted reference to navigate...

Business

Arizona state Senator Wendy Rogers has introduced new bills and a constitutional resolution targeting digital assets, aiming to exempt cryptocurrency from state taxation and...

Cryptocurrency

The European Council and the European Central Bank (ECB) have announced plans to allow offline transactions in the digital euro. This aims to provide...

Business

The IMF says that the El Salvador government is negotiating the sale of its Chivo Bitcoin wallet. The government continues to leverage global agreements...

polkadot
Polkadot (DOT) $ 1.89 0.20%
bitcoin
Bitcoin (BTC) $ 89,429.00 1.99%
ethereum
Ethereum (ETH) $ 3,011.56 2.50%
cardano
Cardano (ADA) $ 0.375411 0.29%
xrp
XRP (XRP) $ 1.90 1.35%
stellar
Stellar (XLM) $ 0.224753 0.23%
litecoin
Litecoin (LTC) $ 79.08 0.72%