User X was scammed by a fake app, took over and bypassed 2FA

This article is machine translated
Show original

A sophisticated phishing campaign that leverages the X platform's app authorization mechanism has bypassed passwords and two-factor authentication to take over multiple cryptocurrency-related accounts.

The attacker tricked users into authorizing a fake app called “Calendar” via a link impersonating Google Calendar; the app requested full control. Users should check and immediately revoke the suspicious app on X’s authorization page to limit damage.

MAIN CONTENT
  • Form: phishing via fake “Calendar” application authorization.
  • Impact: bypassing password and 2FA, leading to account takeover.
  • Emergency action: go to X's authorized app page, revoke the suspicious app and change the password.

How the attack works

The attacker sends a fake link using the name Google Calendar, asking the user to authorize the “Calendar” application to access account X.

The link contains spoofed characters and broad access permissions (full control), granting an access Token to the malicious application; thanks to the Token, the bad guy can manipulate or log in without a password or 2FA.

Who bears the risks and consequences?

Any X user, especially those involved in cryptocurrency activities, could be affected by approving the malicious app.

Consequences include loss of control of the account, leakage of sensitive information, or property damage if the account is used to navigate transactions involving cryptocurrency.

How to check and treat if you may have been affected

Go to the “Authorized Apps” page on X, find and revoke any strange apps named “Calendar” or apps from unknown sources; change the password and revoke the Token.

Re-enable two-factor authentication if needed, review login activity, notify the platform and related services if unusual transactions are detected.

How to spot fake Google Calendar links?

Impersonating links often contain strange characters, unofficial domains, or request excessive access; double-check the link before authorizing.

If I have authorized the “Calendar” application, what should I do first?

Go to the X authorization app page and revoke the app, change your password, check your login activity, and contact platform support if necessary.

Does enabling or disabling 2FA prevent this type of attack?

2FA protects in most cases but does not prevent if the Access Token was granted via app authorization; always check the app authorization.

Source
Disclaimer: The content above is only the author's opinion which does not represent any position of Followin, and is not intended as, and shall not be understood or construed as, investment advice from Followin.
Like
70
Add to Favorites
10
Comments