Connect with us

Hi, what are you looking for?

X twitter account hack attack new advanced
X twitter account hack attack new advanced

News

Phishing Plan for Crypto Influencer X Exploits 2FA Bypass

A sophisticated phishing attack targets crypto influencers on X using 2FA bypass via fake Google Calendar links.

💻 Bitcoin Accounts Targeted via Phishing, Says Yuga Labs

A new phishing campaign is targeting the X accounts of crypto influencers. Attackers bypass 2FA, gaining full control of user accounts.

Crypto developer Zak Cole warns the attack exploits X’s own tools to hijack accounts.

“Zero detection. Active right now. Full account takeover,” Cole said.

Unlike traditional phishing scams, this attack does not use a fake page to steal credentials. Instead, it manipulates the application authorization system of X.

MetaMask security expert Ohm Shah confirmed seeing the campaign “in the wild,” indicating multiple high-profile accounts are targeted.


⚙️ How the Phishing Campaign Works

The phishing begins with a message containing a link resembling a Google Calendar redirect, but it actually points to a fake URL: x(.)ca-lendar(.)com. X previews metadata, making the link look legitimate.

“Your brain sees Google Calendar. The URL is different,” Cole explained.

Clicking the link directs the user to an X authentication endpoint requesting app authorization for a calendar app. The app name uses subtle Cyrillic characters, technically differing from the genuine “Calendar” app in X’s system.

Also Read : Bank of Canada Calls to Regulate Stablecoins to Keep Canada a Leader in Payments


⚠️ Warning Signs to Watch

The phishing app requests unnecessary permissions, such as:

  • Following or unfollowing accounts
  • Updating profiles and account settings
  • Creating and deleting posts
  • Engaging with other users’ posts

These permissions indicate attackers can gain full control of compromised accounts.

Additionally, once authorized, users are redirected to Calendly instead of Google Calendar, signaling a scam.


How to Protect Yourself

Zak Cole recommends:

  • Reviewing your X connected apps page
  • Revoking suspicious applications, especially those named “Calendar”
  • Ensuring no unauthorized apps have access to your account

This attack highlights the increasing sophistication of phishing tactics targeting top crypto personalities. Vigilance with app permissions is crucial to safeguarding accounts.

author avatar
June
June is a sharp-eyed journalist at 4Cby360, blending a passion for global finance and emerging tech with a knack for clear, insightful storytelling. From crypto trends to market shifts, June delivers unbiased, well-researched news that keeps readers informed and ahead of the curve.
Advertisement

You May Also Like

Business

The integration of the RLUSD stablecoin as an off-ramp for BlackRock and VanEck tokenized funds by Ripple and Securitize boosts enterprise crypto adoption and...

Cryptocurrency

CFTC plans to let USDC and Tether be used as collateral in derivatives markets, backed by Circle, Ripple, Coinbase, and Crypto.com.

Business

Morgan Stanley E*Trade will provide Bitcoin, Ether, and Solana trading in 2026 through Zerohash.

Cryptocurrency

The UAE signs CARF agreement to share crypto tax data globally by 2028, aligning with OECD guidelines.

polkadot
Polkadot (DOT) $ 3.96 3.43%
bitcoin
Bitcoin (BTC) $ 111,647.00 2.06%
ethereum
Ethereum (ETH) $ 4,106.36 2.53%
cardano
Cardano (ADA) $ 0.797754 2.89%
xrp
XRP (XRP) $ 2.86 2.45%
stellar
Stellar (XLM) $ 0.366053 2.48%
litecoin
Litecoin (LTC) $ 105.94 1.97%