{"id":68343,"date":"2024-01-05T17:27:53","date_gmt":"2024-01-05T21:27:53","guid":{"rendered":"https:\/\/coinscreed.com\/staging\/?p=68343"},"modified":"2024-01-05T17:27:56","modified_gmt":"2024-01-05T21:27:56","slug":"forbes-impersonator-hacks-certiks-x-account-in-phishing-scam","status":"publish","type":"post","link":"https:\/\/coinscreed.com\/staging\/forbes-impersonator-hacks-certiks-x-account-in-phishing-scam\/","title":{"rendered":"Forbes Impersonator Hacks CertiK&#8217;s X Account in Phishing Scam"},"content":{"rendered":"\n<p>According to an X post from CertiK on January 5, a phishing scammer impersonating a Forbes reporter temporarily accessed the X (previously Twitter) account of the <a href=\"https:\/\/coinscreed.com\/staging\/blockchain-a-new-frontier-for-cybersecurity.html\" target=\"_blank\" rel=\"noreferrer noopener\">blockchain security<\/a> platform CertiK and used it to promote a malicious Web3 application.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"540\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/01\/image-37-1024x540.png\" alt=\"Forbes Impersonator Hacks CertiK's X Account in Phishing Scam\" class=\"wp-image-68384\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/01\/image-37-1024x540.png 1024w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/01\/image-37-300x158.png 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/01\/image-37-768x405.png 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/01\/image-37-18x9.png 18w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/01\/image-37-750x395.png 750w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/01\/image-37.png 1112w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Forbes Impersonator Hacks CertiK's X Account in Phishing Scam<\/figcaption><\/figure>\n\n\n\n<p>One of our employees received communication from a verified account affiliated with a reputable media organization. This employee was, unfortunately, the target of a phishing attack after the compromise of this account.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"embed-twitter\"><blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">A verified account, associated with a well-known media, contacted one of our employees. Unfortunately, it appears that this account was compromised, leading to a phishing attack on our employee.  <br><br>We quickly detected the breach and deleted the related tweets within minutes. Our\u2026 <a href=\"https:\/\/t.co\/aO7GQjXEz2\" target=\"_blank\">pic.twitter.com\/aO7GQjXEz2<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"wpil-svg-outbound-7-icon-path\" fill=\"none\" clip-path=\"url(#clip0_31_188)\">\r\n                            <path d=\"M9.16724 14.8891L20.1672 3.88908\" stroke-linecap=\"round\"\/>\r\n                            <path d=\"M13.4497 3.53554L20.5208 3.53554L20.5208 10.6066\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\r\n                            <path d=\"M17.5 13.5L17.5 16.26C17.5 17.4179 17.5 17.9968 17.2675 18.4359C17.0799 18.7902 16.7902 19.0799 16.4359 19.2675C15.9968 19.5 15.4179 19.5 14.26 19.5L7.74 19.5C6.58213 19.5 6.0032 19.5 5.56414 19.2675C5.20983 19.0799 4.92007 18.7902 4.73247 18.4359C4.5 17.9968 4.5 17.4179 4.5 16.26L4.5 9.74C4.5 8.58213 4.5 8.0032 4.73247 7.56414C4.92007 7.20983 5.20982 6.92007 5.56414 6.73247C6.0032 6.5 6.58213 6.5 7.74 6.5L11 6.5\" stroke-linecap=\"round\"\/>\r\n                        <\/g>\r\n                        <defs>\r\n                            <clipPath id=\"clip0_31_188\">\r\n                                <rect fill=\"white\" height=\"24\" width=\"24\"\/>\r\n                            <\/clipPath>\r\n                        <\/defs><\/svg><\/span><\/a><\/p>&mdash; CertiK (@CertiK) <a href=\"https:\/\/twitter.com\/CertiK\/status\/1743252309662912937?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">January 5, 2024<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/div>\n<\/div><\/figure>\n\n\n\n<p>According to the post, a verified account associated with a well-known media outlet contacted one of our employees. The post asserted that the compromise of the account led to the employee being phished and &#8220;related tweets&#8221; being published to the account.<\/p>\n\n\n\n<p>At this time, the malicious messages have been removed. On January 5, the <a href=\"https:\/\/cyvers.ai\/\" target=\"_blank\" rel=\"noreferrer noopener\">blockchain security platform Cyvers <span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a>asserted in a post to X that it had observed the purged messages before their removal. <\/p>\n\n\n\n<p>Per their assertions, the communications declared the compromise of Uniswap's router and instructed recipients to cancel all authorizations for Uniswap by utilizing Revoke.cash. It resulted in a rogue version of Revoke.cash attempting to steal users' cryptocurrency.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"embed-twitter\"><blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">\ud83d\udea8ALERT\ud83d\udea8We are seeing reports that <a href=\"https:\/\/twitter.com\/CertiK?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">@CertiK<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a>&#39;s X account has been compromised!<br><br>Do NOT click any links promoted! <a href=\"https:\/\/twitter.com\/hashtag\/CyversAlert?src=hash&ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">#CyversAlert<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a> <a href=\"https:\/\/t.co\/4M3JNNaJ53\" target=\"_blank\">pic.twitter.com\/4M3JNNaJ53<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a><\/p>&mdash; \ud83d\udea8 Cyvers Alerts \ud83d\udea8 (@CyversAlerts) <a href=\"https:\/\/twitter.com\/CyversAlerts\/status\/1743199587144245252?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">January 5, 2024<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/div>\n<\/div><\/figure>\n\n\n\n<p>According to CertiK, the team promptly initiated a recovery procedure to revoke the attacker's access to its X account within seven minutes of their publication after discovering the malicious communications. <\/p>\n\n\n\n<p>The group was able to remove the initial negative post within fourteen minutes. The team achieved success in neutralizing the threat 37 minutes into the investigation.<\/p>\n\n\n\n<p>CertiK asserted that the fraud was a component of &#8220;an ongoing, large-scale attack&#8221; comparable to the one X user NFT_Dreww.eth described in a December 21 post. <\/p>\n\n\n\n<p>The attacker posed as a Forbes reporter and instructed victims to link their X accounts to the Calendly calendar app to arrange a meeting, as described in the NFT_Dreww.eth account for the<a href=\"https:\/\/coinscreed.com\/staging\/chinese-hackers-use-fake-skype-app-in-new-crypto-phishing-scam.html\" target=\"_blank\" rel=\"noreferrer noopener\"> phishing scheme<\/a>. <\/p>\n\n\n\n<p>The hyperlinks could have led to the official website of Calendly. In lieu of that, they visited a fraudulent Calendly site that featured a misspelled URL. Unknowingly granting the assailant permission to publish content on behalf of the victim on X, they &#8220;connected&#8221; their X account to the fraudulent website.<\/p>\n\n\n\n<p>ZachXBT, an on-chain investigator, purportedly attached a screenshot of the deceptive message that CertiK received in response to CertiK's post. The message appears to originate from an imposter posing as Mark Beech, a deceased former contributor to Forbes and Bloomberg who passed away in 2020.<\/p>\n\n\n\n<p>ZachXBT inquired in their post whether CertiK would reimburse victims who came into contact with phishing attempts due to the deceptive post to CertiK's account. CertiK issued the following statement in response: &#8220;We urge all individuals impacted by the recent Twitter incident to contact us.&#8221;<\/p>\n\n\n\n<p>Phishing attempts in the last fortnight have compromised several prominent crypto X accounts. On December 29, a breach occurred on the Compound Finance account. Equally affected on January 4 was the proprietor of <a href=\"https:\/\/coinscreed.com\/staging\/polychain-capital-coinfund-raise-350m-for-new-crypto-funds.html\" target=\"_blank\" rel=\"noreferrer noopener\">Polychain Capital<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to an X post from CertiK on January 5, a phishing scammer impersonating a Forbes reporter temporarily accessed the X (previously Twitter) account of the blockchain security platform CertiK and used it to promote a malicious Web3 application. One of our employees received communication from a verified account affiliated with a reputable media organization. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":68384,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[11476],"tags":[6357,17780,8194,17779],"class_list":["post-68343","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hacks-and-scams","tag-certik","tag-forbes-impersonator","tag-phishing-attack","tag-x-account"],"jetpack_featured_media_url":"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/01\/image-37.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/68343","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/comments?post=68343"}],"version-history":[{"count":0,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/68343\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media\/68384"}],"wp:attachment":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media?parent=68343"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/categories?post=68343"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/tags?post=68343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}