
Social Media Platform X's Phishing Scam
Cybercriminals are sending phishing scams to steal users X's login information.
Cybercriminals use urgent wording in many of their scams to trick people into performing in action without thinking. They have created various versions of a scam to steal your login information to the social media platform X.
What does the scam look like?
The cybercriminals have a couple of versions of this scam. In one of them a phishing email is sent to the user saying that someone tried to login to your X account on a new device. Along with this email it urges the user to log into their X account immediately to verify their account. When the user clicks the link to login to verify, the link goes to a fake X login page that was created by the cybercriminals to steal your login.
Another version of this scam is the user is sent a phishing email stating your account has violated copyright laws and that you need to login and submit an appeal. Just like the first version, when the user clicks the link to login to submit the appeal the link goes it a fake X login page that was created by the cybercriminals to steal your login.
What can the cybercriminals do with the login information?
Once they gain access to this login information, they can access any account that the user uses the same login and password with. This is why it is very important to have a unique password for every account you have. Cybercriminals also can use your X account and target other X users. They can do this by posting phishing links looking to come from you and sending messages to your followers.
TIPS ON HOW TO SPOT A SCAM:
- Never login from a link on an unexpected email. Make sure you are using a safe browser to access and see if you have any of these claims on your actual account.
- Make sure to hover over links to see where they are actually taking you.
- Always be cautious of emails or messages with urgent wording. Remember that cybercriminals want you to play on your emotions and for you to act without thinking.
- Make sure you are using two factor authentication wherever you can!