Cybercriminals Exploit Verified X Accounts for Malicious Activities

Cybercriminals are targeting verified “Gold” accounts on the social media service X (formerly Twitter), selling them on the Dark Web for up to $2,000 each, according to research by CloudSEK.

The Gold badge signifies independent verification by X for high-profile organizations or celebrities.

Hackers use various methods, including brute-forcing passwords and stealing credentials, to gain access to Gold accounts. Non-gold accounts associated with inactive real organizations are also being upgraded to verified status.

These compromised accounts, with large followings, are sold on the Dark Web for malicious activities such as hosting phishing links, launching disinformation campaigns, financial scams, or damaging brand reputation. Attackers took over the X account of Ethereum co-founder Vitalik Buterin, siphoning off $691,000 in digital assets within 20 minutes.

To help protect your privacy online, PC Matic includes Dark Web Monitoring and a Password Manager.

PC Matic’s complete protection also provides users with antivirus protection against malware and ransomware. Additionally, users enjoy the advantages of a VPN for online freedom, premium identity theft protection, bank and credit monitoring, dark web monitoring, and 100% USA-based phone support.

Organizations should regularly monitor brand mentions on X, implement strong password policies, and be vigilant against account compromise.


PC Matic delivers complete home and business cybersecurity protection against ransomware, malware, identity theft, online tracking, data breaches, and more. For over 20 years, PC Matic’s award-winning cyber protection has saved millions of satisfied customers from becoming the next cybercrime victim and is exclusively made in the USA.
Learn more about PC Matic today!
pcmatic.com
[email protected]

Stop Responding to Threats.
Prevent Them.

Want to get monthly tips & tricks?

Subscribe to our newsletter to get cybersecurity tips & tricks and stay up to date with the constantly evolving world of cybersecurity.

Related Articles