Connect with us

Hi, what are you looking for?

X twitter account hack attack new advanced
X twitter account hack attack new advanced

News

Phishing Plan for Crypto Influencer X Exploits 2FA Bypass

A sophisticated phishing attack targets crypto influencers on X using 2FA bypass via fake Google Calendar links.

💻 Bitcoin Accounts Targeted via Phishing, Says Yuga Labs

A new phishing campaign is targeting the X accounts of crypto influencers. Attackers bypass 2FA, gaining full control of user accounts.

Crypto developer Zak Cole warns the attack exploits X’s own tools to hijack accounts.

“Zero detection. Active right now. Full account takeover,” Cole said.

Unlike traditional phishing scams, this attack does not use a fake page to steal credentials. Instead, it manipulates the application authorization system of X.

MetaMask security expert Ohm Shah confirmed seeing the campaign “in the wild,” indicating multiple high-profile accounts are targeted.


⚙️ How the Phishing Campaign Works

The phishing begins with a message containing a link resembling a Google Calendar redirect, but it actually points to a fake URL: x(.)ca-lendar(.)com. X previews metadata, making the link look legitimate.

“Your brain sees Google Calendar. The URL is different,” Cole explained.

Clicking the link directs the user to an X authentication endpoint requesting app authorization for a calendar app. The app name uses subtle Cyrillic characters, technically differing from the genuine “Calendar” app in X’s system.

Also Read : Bank of Canada Calls to Regulate Stablecoins to Keep Canada a Leader in Payments


⚠️ Warning Signs to Watch

The phishing app requests unnecessary permissions, such as:

  • Following or unfollowing accounts
  • Updating profiles and account settings
  • Creating and deleting posts
  • Engaging with other users’ posts

These permissions indicate attackers can gain full control of compromised accounts.

Additionally, once authorized, users are redirected to Calendly instead of Google Calendar, signaling a scam.


How to Protect Yourself

Zak Cole recommends:

  • Reviewing your X connected apps page
  • Revoking suspicious applications, especially those named “Calendar”
  • Ensuring no unauthorized apps have access to your account

This attack highlights the increasing sophistication of phishing tactics targeting top crypto personalities. Vigilance with app permissions is crucial to safeguarding accounts.

author avatar
June
June is a sharp-eyed journalist at 4Cby360, blending a passion for global finance and emerging tech with a knack for clear, insightful storytelling. From crypto trends to market shifts, June delivers unbiased, well-researched news that keeps readers informed and ahead of the curve.
Advertisement

You May Also Like

Cryptocurrency

This week in crypto: France has added cryptocurrencies to its wealth taxes, raising alarms among European investors. A nefarious actor targets Balancer, stealing $116M...

Cryptocurrency

Former President Donald Trump claims Americans will soon receive a $2,000 tariff dividend, arguing his sweeping trade tariffs will directly benefit households. Analysts warn...

Cryptocurrency

Italy’s top banks say they support the Digital Euro push, calling it a crucial step toward European digital sovereignty. But they warn the ECB’s...

Cryptocurrency

China’s top cyber agency has accused the United States of secretly seizing 127,000 stolen Bitcoin from the 2020 LuBian mining pool hack — worth...

polkadot
Polkadot (DOT) $ 2.87 2.08%
bitcoin
Bitcoin (BTC) $ 100,157.00 1.70%
ethereum
Ethereum (ETH) $ 3,244.92 5.03%
cardano
Cardano (ADA) $ 0.531538 2.85%
xrp
XRP (XRP) $ 2.33 2.33%
stellar
Stellar (XLM) $ 0.269581 3.30%
litecoin
Litecoin (LTC) $ 97.09 0.75%