Loading cryptocurrency prices...

Sophisticated Phishing Scam Bypasses 2FA on Crypto X Accounts

Phishing Campaign Bypasses 2FA to Hijack X Accounts of Crypto Influencers via Malicious App Permissions

  • New phishing campaign targets X accounts of crypto figures using advanced methods.
  • Attack bypasses two-factor authentication by exploiting X’s application support system.
  • Phishing links masquerade as Google Calendar, leveraging X’s metadata for credibility.
  • Attackers request broad permissions, allowing full account takeover if granted.
  • Security experts urge users to check connected apps and revoke suspicious access immediately.

A phishing campaign is targeting the X accounts of well-known crypto personalities, using tactics that bypass traditional security measures. Attackers are sending direct messages that appear credible and can result in a full account takeover if the recipient interacts with a malicious link. This activity is ongoing, with zero detection reported so far according to Zak Cole, a crypto developer.

- Advertisement -

The campaign does not use fake login pages or attempt to steal passwords directly. Instead, it exploits X’s own app authorization features to gain entry, sidestepping two-factor authentication (2FA). MetaMask security researcher Ohm Shah confirmed the attack is active across the platform. Reports also indicate an OnlyFans model fell victim to a less advanced version of the same scheme.

The phishing attempt begins with a message that appears to be from a legitimate source, such as an employee from Andreessen Horowitz. It contains a link showing the official Google Calendar address in X’s message preview. In reality, the URL leads to “x(.)ca-lendar(.)com,” a domain registered only days before the attacks. The preview displays “calendar.google.com” thanks to manipulated metadata, which is meant to trick users.

Once clicked, the link redirects to an X authorization page, asking the user to allow an app named “Calendar” to access their account. Technical analysis revealed that the app name includes Cyrillic characters resembling standard letters, making the fake app appear genuine. Granting access gives the attackers broad permissions, including changing profile information, posting, deleting content, and engaging with other users.

A hint that something is wrong may appear as a brief, unusual URL before redirection. On the authorization page, the app requests unnecessary access for a supposed calendar tool. After giving permission, users are redirected to a different service, Calendly, which is inconsistent with the initial Google Calendar claim. Zak Cole noted this inconsistency could alert observant users.

- Advertisement -

For those concerned their X account may be compromised, Cole recommends visiting the X connected apps page and revoking any suspicious “Calendar” access. Detailed technical findings are available in Cole’s GitHub report here.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Harvard Boosts Bitcoin ETF Holdings to $443M in Q3

Harvard University increased its holdings in the BlackRock iShares Bitcoin Trust to about $443...

Russia to Float First Chinese Yuan Bonds in December 2025

Russia plans to issue its first bonds denominated in the Chinese yuan in December...

Bitcoin Dips Below $100K, JPMorgan Predicts $170K by 2026

Bitcoin's price recently dropped below $100,000, falling to around $94,000 before rebounding.JPMorgan analysts identified...

Aster Confirms Tokenomics Unchanged After CMC Data Mix-Up

Aster confirms no changes to its tokenomics after update discrepancies triggered community concern.Incorrect token...

Five Guilty in US Scheme Aiding North Korean IT Worker Fraud

Five individuals pleaded guilty to aiding North Korea in illicit revenue by enabling fraudulent...
- Advertisement -

Must Read

10 Best Crypto to Mine Without Special Hardware Equipment

A lot of people mostly think that it takes a difficult process to mine cryptocurrency. today we are going to show you some of...