Phishing in the comment section of high-profile accounts: What's going on?

Phishing in the comment section of high-profile accounts: What's going on?

Communication and Sharing.

Background

Recently, we have observed multiple cases of theft, and upon analysis, we have discovered that the majority of these incidents were due to phishing comments appearing below tweets from well-known project accounts.

Phishing in the comment section of high-profile accounts: What's going on?

Through targeted analysis and statistics, it has been found that approximately 80% of well-known project accounts have their comment sections occupied by fraudulent phishing accounts after they publish tweets. Considering the high level of automation among phishing groups and the relatively low security awareness among some cryptocurrency professionals, this article will provide a detailed analysis of the modus operandi of phishing groups in the comment sections of well-known project accounts on Twitter to alert cryptocurrency practitioners.

Modus Operandi

  1. Purchasing Twitter Accounts

We have found numerous groups on Telegram selling Twitter accounts, which come with a certain number of followers, posts, and varying registration dates. Buyers can choose suitable accounts based on their needs. Upon reviewing the historical records of these groups, it was found that they primarily sell accounts related to the cryptocurrency industry and influencer accounts.

Phishing in the comment section of high-profile accounts: What's going on?

In addition to Telegram groups selling accounts, there are websites specifically dedicated to selling Twitter accounts. These websites offer accounts from different years and support the purchase of fake accounts that closely resemble specific genuine accounts, such as "Optimlzm" resembling the genuine account "Optimism." These websites also accept cryptocurrency as payment.

  1. After acquiring ready-made accounts, phishing groups use promotional tools to buy followers and engagement to increase the credibility of the accounts.

These promotional tools also support payment in cryptocurrency and offer services such as likes, retweets, and increasing follower count for mainstream social media platforms. Buyers simply input the link to be promoted and their desired quantity to make a purchase.

Phishing in the comment section of high-profile accounts: What's going on?

According to customer service representatives of these platforms, they have processed over 1.3 million orders, with over 20,000 users having utilized their services.

Phishing in the comment section of high-profile accounts: What's going on?

Following the completion of the aforementioned preparations, phishing groups possess a Twitter account with a sufficient number of posts and followers. They then mimic the information within this account to replicate the content of the project's official account. As a result, for some individuals, distinguishing between these two accounts becomes challenging. Subsequently, phishing groups proceed to execute the crucial steps of phishing.

  • Phishing groups' automated bots track and follow the updates of well-known project accounts.
  • Upon the release of a tweet by the project, these bots automatically leave comments to ensure occupying the first position in the comment section, thereby attracting more attention and engagement.
  • As users are browsing posts genuinely published by the project, and the phishing group's account is disguised to closely resemble the project's account, users may lower their guard. Clicking on links sent by the disguised phishing account under the guise of airdrops and other similar offers, and subsequently authorizing and signing, can lead to asset loss.

Case Example

On January 12th, the official Twitter account of Optimism posted a tweet, and the first comment under this tweet was posted by a phishing group. This comment garnered significant interaction and included a link to the official website. However, the link in the text portion of the comment was a phishing link.

Phishing in the comment section of high-profile accounts: What's going on?

Phishing groups exploit Twitter's name change mechanism, whereby users can modify their display names but not their unique identifiers on Twitter, i.e., their usernames, typically prefixed with the "@" symbol. The display name of the fake account was changed to match that of the official account, both named "Optimism." However, upon closer inspection, slight discrepancies were evident between the username of the imitation account and that of the official account. The fake account replaced the "is" in the official account's username with "lz."

MistTrack Analysis

Using the on-chain tracking tool MistTrack to query the address 0xd02c75102ed941b26e318c0896c5b5aeb4ddc965 associated with the sale of Twitter accounts on Telegram, we found that addresses sending funds to this address were all flagged by MistTrack as malicious addresses associated with phishing, theft, and other malicious activities. Double-clicking on these addresses led to the discovery of even more malicious addresses, highlighting the extensive nature of this black market.

Phishing in the comment section of high-profile accounts: What's going on?

Countermeasures

1、To optimize anti-phishing plugins, it is essential to focus on the primary methods of NFT phishing in the blockchain industry. It is understood that 90% of NFT phishing is related to fake domains. Therefore, real-time tracking of phishing fake domains and alerting users is crucial. For example, when a user opens a phishing page, relevant plugins or browsers should immediately prompt the risk. This way, users can be aware of the risk before signing authorization, effectively preventing subsequent fraudulent activities and eliminating risks at the inception stage.

2、Another crucial security feature is the "what you see is what you sign" and interactive security recognition functions of wallets. If a wallet has a signature recognition function, it should be able to clearly display detailed information about what the user is about to sign, such as authorization content, amount, recipient, and other human-readable data. This way, users can clearly understand the details of the authorization, establish the last line of defense, and prevent users from falling into traps at the last minute.

3、Finally, establishing personal security awareness is crucial. Although products, articles, and reminders can provide assistance, the key is to cultivate one's own security awareness. Before clicking on links, authorizing, or signing, it is essential to double-check. Only through constant self-awareness can one stay away from asset losses and the troubles of being deceived.

Development Contacts

 

Copyrights:yiyi Posted on 2024年 1月 30日 pm4:04。
Please specify source if reproducedPhishing in the comment section of high-profile accounts: What's going on? | CoinNav- Blockchain Trading Starts Here

Related posts