If you use X, formerly known as Twitter, you may have seen accounts with gray or gold credentials promoting cryptocurrencies.
They often disguise themselves as real cryptocurrencies. You might think these cryptocurrencies are legal, but they are actually the work of hackers who hijacked your X account.
These hackers target political, corporate, and other official accounts you trust in order to trick you into participating in cryptocurrency scams.
Some act as intermediaries and sell accounts to malicious actors.
Example of X verified accounts with gray and gold check marks (Company X)
Using trusted accounts for cryptocurrency fraud
cyber security expert malware hunter team Accounts of a Canadian senator, a Brazilian politician, and a non-profit organization were all found to be used to promote cryptocurrencies. According to their report, the hackers used the account of a Canadian politician to pose as a legitimate cryptocurrency project, but the actual account has not even been verified.
The FBI recognized MLK for reporting by X in a fact-checking community note.
Its attack is twofold. The hacker not only tries to trick X users into thinking it is a real cryptocurrency project, but also uses its gold or gray check mark to trick users into thinking it is trustworthy. Masu.
Cybersecurity company Mandiant also had its X profile hijacked. The hacker modified the profile to impersonate the Phantom cryptocurrency wallet. He then promised free tokens to users who clicked on the link.

Retweet by hacker (Malware Hunter Team)
The screenshot above shows the attacker using the official Phantom account to retweet a post warning users to “never rush to click on links.” This was likely a tactic to make future cryptocurrency scam posts seem more trustworthy.
US water utilities targeted by foreign hackers, prompting calls to overhaul cybersecurity
however, Bleeping Computer Report Users who clicked on the link were found to be redirected to download the genuine Phantom cryptocurrency wallet.then hackers will attack — Depletes an unsuspecting user’s cryptocurrency wallet.

Phantom X account (Malware Hunter Team)
More: New iPhone security threat lets hackers spy on your phone
How to stay safe with X
Even though these hackers are doing everything they can to trick you into handing over your money, you can take these 10 steps to protect yourself.
1. If it sounds too good to be true, it probably isn't.
The old adage is usually true. Most hackers hope you don't see through their plans and think they're getting an incredible deal. However, you need to ask yourself: Why would companies just give out free cryptocurrencies? Are there any pitfalls? What will that do for the company?
2. Do your research
You should research cryptocurrencies thoroughly before investing in them. Make sure you know what you're investing in and take the time to research it. Just clicking on a social media post and trusting it is usually not a good idea and can make you a target for hackers.
3. Use strong passwords
Use strong passwords that you don't reuse on other websites. Please consider using . password manager Generate and save complex passwords. It helps you create unique, hard-to-crack passwords that hackers can never guess. Second, he keeps track of all your passwords in one place and enters them for you when you log into your account, so you don't have to remember them yourself. The fewer passwords you remember, the less likely you are to reuse them on your account.
4. Use two-factor authentication
two elements certification Adds an extra layer of security to your X account. When you log in, you must enter both your password and verification code, or use your security key. This way, only you can access your account. To register, you must have a verified email address linked to your account. X uses email addresses to communicate with you and to keep your account secure.
Once you enable this feature, you'll need two things to log into your account: your password and a second authentication method. Choose from codes, app verification, or physical security keys.
5. Email and phone number required to request a password reset link or code
Attaching an up-to-date email address to your account is a great way to improve account security. Also, adding a phone number to your account is a great step to keeping your account safe. By registering your phone number with your account, you can register for security features such as: Login authentication. It also allows for faster account recovery. If you lose access to your account, attaching your phone number will make it easier to get back to your X account.
6. Be wary of suspicious links
Be wary of suspicious links and make sure you're on twitter.com before entering your login information.
7. Don't be fooled by false promises
Never share your username and password with any third party, especially those who promise to gain followers, make money, or verify your identity.
8. Make sure your software is updated
Please ensure that your computer software, including your browser, is suitable. to date Use the latest upgrades and antivirus software.
9. Install good antivirus software on all your devices
The best way to protect yourself from data breaches is to install antivirus protection on all your devices. Having good antivirus software actively running on your device will warn you about malware in your system, warn you against clicking on malicious links in phishing emails, and ultimately protect you from hacking. Get my picks for the best antivirus protection products of 2024 for Windows, Mac, Android, and iOS devices.
10. Check if your account has been compromised
If you really think your X account has been hacked, you should check to see if your account has been compromised. To do this, Security and login Check your account settings section to see which devices and locations you are logged in to. If you notice suspicious activity, such as logins from unknown devices or locations, you should immediately change your password and enable two-factor authentication. You should also report any unauthorized access to X.

If you think you are a victim of a social media scammer
If you suspect that you are a victim of a social media scammer, you should take urgent steps immediately. Here are some steps you can take right away.
Protect your account
immediately Please change your password To keep potential hackers out. If your account is locked out, please contact X Support immediately to recover your account.
Notify your contacts
Tell your friends and family and let them know. That way, hackers won't be fooled by messages or requests from compromised accounts.
Monitor account activity
Monitor active sessions, messages sent, and changes made to your account. Report and cancel any activities you are unfamiliar with.
seek professional help
If you believe that your personal information, such as financial data or other sensitive information, has been compromised, please consider contacting us at: Cybersecurity experts or services. We can guide you through further recovery and protection steps.
Use identity theft protection
If you want a service that will walk you through every step of the reporting and recovery process, one of the best ways to protect yourself from this type of fraud is to register with an identity theft service.
Anti-theft companies can monitor your personal information, such as your home title, social security number, phone number, and email address. It can also alert you if it's being sold on the dark web or if someone is opening an account with it. It can also help freeze bank and credit card accounts to prevent further misuse by criminals. Check out our tips and recommendations on how to protect yourself from identity theft..
Read more: How to lock criminal hackers out of your digital accounts
Cart important points
These hackers want you to let your guard down because they are trying to take advantage of your trust. That's why it's so important to be vigilant. While trying to deceive you using official looking accounts, try to authenticate using that person's or organization's website or other social media accounts. The gray and gold X verification mark is usually legitimate, but it's not 100% sure.
CLICK HERE TO GET THE FOX NEWS APP
What do you think X and other social media platforms should do to prevent or stop cryptocurrency fraud? Email us at. Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report newsletter using the link below. Cyberguy.com/Newsletter.
Ask your cart a question or let us know your story you'd like us to feature.
Answers to CyberGuy frequently asked questions:
Copyright 2024 CyberGuy.com. All rights reserved.
