Sophisticated Phishing Scam Bypasses 2FA on Crypto X Accounts

Phishing Campaign Bypasses 2FA to Hijack X Accounts of Crypto Influencers via Malicious App Permissions

  • New phishing campaign targets X accounts of crypto figures using advanced methods.
  • Attack bypasses two-factor authentication by exploiting X’s application support system.
  • Phishing links masquerade as Google Calendar, leveraging X’s metadata for credibility.
  • Attackers request broad permissions, allowing full account takeover if granted.
  • Security experts urge users to check connected apps and revoke suspicious access immediately.

A phishing campaign is targeting the X accounts of well-known crypto personalities, using tactics that bypass traditional security measures. Attackers are sending direct messages that appear credible and can result in a full account takeover if the recipient interacts with a malicious link. This activity is ongoing, with zero detection reported so far according to Zak Cole, a crypto developer.

- Advertisement -

The campaign does not use fake login pages or attempt to steal passwords directly. Instead, it exploits X’s own app authorization features to gain entry, sidestepping two-factor authentication (2FA). MetaMask security researcher Ohm Shah confirmed the attack is active across the platform. Reports also indicate an OnlyFans model fell victim to a less advanced version of the same scheme.

The phishing attempt begins with a message that appears to be from a legitimate source, such as an employee from Andreessen Horowitz. It contains a link showing the official Google Calendar address in X’s message preview. In reality, the URL leads to “x(.)ca-lendar(.)com,” a domain registered only days before the attacks. The preview displays “calendar.google.com” thanks to manipulated metadata, which is meant to trick users.

Once clicked, the link redirects to an X authorization page, asking the user to allow an app named “Calendar” to access their account. Technical analysis revealed that the app name includes Cyrillic characters resembling standard letters, making the fake app appear genuine. Granting access gives the attackers broad permissions, including changing profile information, posting, deleting content, and engaging with other users.

A hint that something is wrong may appear as a brief, unusual URL before redirection. On the authorization page, the app requests unnecessary access for a supposed calendar tool. After giving permission, users are redirected to a different service, Calendly, which is inconsistent with the initial Google Calendar claim. Zak Cole noted this inconsistency could alert observant users.

- Advertisement -

For those concerned their X account may be compromised, Cole recommends visiting the X connected apps page and revoking any suspicious “Calendar” access. Detailed technical findings are available in Cole’s GitHub report here.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Goldman Sachs Slashes Copper Supply Forecasts After Grasberg Halt

Goldman Sachs lowered its global copper supply forecast after an accident at Indonesia’s Grasberg...

Justin Sun Clashes With World Liberty Over WLFI Token Blacklisting

Justin Sun, advisor and major investor in World Liberty Financial, had a significant number...

Malicious Rust Crates Steal Ethereum, Solana Wallet Keys

Researchers found two malicious Rust packages disguised as a popular library targeting crypto wallet...

BRICS Russia Startups Gain Access to Chinese Investment at Summit

More than 600 investors will attend the upcoming BRICS startup summit in Moscow on...

UAE’s M2 Capital Invests $20M in Ethena’s ENA Token Expansion

M2 Capital Limited, part of UAE-based M2 Holdings, invested $20 million in Ethena’s ENA...
- Advertisement -

Must Read

What Is Bcrypt Password Hashing Function?

KEY TAKEAWAYSBcrypt is a password hashing function that transforms plain passwords into unique alphanumeric sequences.It is a one-way process, ensuring that passwords cannot be...