Sunday, April 2, 2023
  • Advertise With Us
  • Write For Us
  • Contact Us
  • About Us
  • Editorial Calendar
Download Latest Issue - Free!
The Cyber Express
Ransomware Report
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities

    Creal Information Stealer Phish Out Cryptocurrency Users

    New Advisory on Thunderbird Vulnerability

    Mozilla Foundation Releases New Advisory on Thunderbird Vulnerability

    Hacktivism

    Hacktivism and The New Age of Cyber Warfare

    3CX

    Global 3CX Telephone App Users at Risk, CEO Blames ‘Upstream Library’

    HACLA Cyber Attack

    Here’s Everything We Know About HACLA Cyber Attack Claimed by LockBit

    Microsoft Bing Search Results

    Microsoft Bing Search Results Altered Through AAD Misconfiguration

    World Data Backup Day

    World Data Backup Day: Are You Doing it Right?

    UK on AI

    UK Government to Go Light on AI Regulation; Musk, Wozniak Call for Six-month Halt on AI

    Spyware Vendor

    Spanish Spyware Vendor’s Product Used to Target UAE Users, Finds Google

  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    cybersecurity-education-legislation

    North Dakota Approves Computer Science and Cybersecurity Education Legislation for K-12 Grades

    BreachForums

    FBI Arrests BreachForums Operator ‘Pompompurin’, Slaps Cybercrime Charges

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    Insider threat mitigation

    Behavioral Psychology, a Boon for Insider Risk Mitigation

    Safer Internet

    International Safer Internet Day: How Safe Are Our Teenagers Online?

    TRAI

    TRAI Asked to Involve MoD in Drafting Big Data Regulations & Policies

    cybersecurity

    Cybersecurity incidents may soon be ‘uninsurable’

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Active Directory

    Prevent Ransomware: Save the Active Directory

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business News
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    CISA

    13 Specialists to Join Forces with CISA’s Cybersecurity Advisory Committee

    GISEC Global 2023

    GISEC Global 2023: H.E. Dr Mohamed Hamad Al-Kuwaiti Recognized for Outstanding Contributions in Advancing Global Cybersecurity

    GISEC Global 2023

    GISEC Global 2023: Knowledge Sharing, Collaboration Vital to Fend off Cyberattacks, say Experts

    Call & Contact Center Expo 2023 Las Vegas

    Call & Contact Center Expo 2023 Las Vegas

    Former BookMyShow CTO Mahesh Vandi Chalil

    Cyble Appoints Former BookMyShow CTO Mahesh Vandi Chalil as Chief Product and Technology Officer

    GISEC 2023

    GISEC 2023: Microsoft Highlights Zero Trust Approach and Mixed Reality Policing Tools

    GISEC Global 2023

    GISEC Global 2023: ‘Take the Fight to Cyber Attackers’ Urges UAE Cybersecurity Council Paper

    Cyble in Forbes List

    Cyble Recognized by Forbes as One of America’s Best Startup Employers 2023

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    •  Cyber Security Webinar
    • World CyberCon Middle East 2023
    • Endorsed Events
No Result
View All Result
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities

    Creal Information Stealer Phish Out Cryptocurrency Users

    New Advisory on Thunderbird Vulnerability

    Mozilla Foundation Releases New Advisory on Thunderbird Vulnerability

    Hacktivism

    Hacktivism and The New Age of Cyber Warfare

    3CX

    Global 3CX Telephone App Users at Risk, CEO Blames ‘Upstream Library’

    HACLA Cyber Attack

    Here’s Everything We Know About HACLA Cyber Attack Claimed by LockBit

    Microsoft Bing Search Results

    Microsoft Bing Search Results Altered Through AAD Misconfiguration

    World Data Backup Day

    World Data Backup Day: Are You Doing it Right?

    UK on AI

    UK Government to Go Light on AI Regulation; Musk, Wozniak Call for Six-month Halt on AI

    Spyware Vendor

    Spanish Spyware Vendor’s Product Used to Target UAE Users, Finds Google

  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    cybersecurity-education-legislation

    North Dakota Approves Computer Science and Cybersecurity Education Legislation for K-12 Grades

    BreachForums

    FBI Arrests BreachForums Operator ‘Pompompurin’, Slaps Cybercrime Charges

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    Insider threat mitigation

    Behavioral Psychology, a Boon for Insider Risk Mitigation

    Safer Internet

    International Safer Internet Day: How Safe Are Our Teenagers Online?

    TRAI

    TRAI Asked to Involve MoD in Drafting Big Data Regulations & Policies

    cybersecurity

    Cybersecurity incidents may soon be ‘uninsurable’

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Active Directory

    Prevent Ransomware: Save the Active Directory

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business News
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    CISA

    13 Specialists to Join Forces with CISA’s Cybersecurity Advisory Committee

    GISEC Global 2023

    GISEC Global 2023: H.E. Dr Mohamed Hamad Al-Kuwaiti Recognized for Outstanding Contributions in Advancing Global Cybersecurity

    GISEC Global 2023

    GISEC Global 2023: Knowledge Sharing, Collaboration Vital to Fend off Cyberattacks, say Experts

    Call & Contact Center Expo 2023 Las Vegas

    Call & Contact Center Expo 2023 Las Vegas

    Former BookMyShow CTO Mahesh Vandi Chalil

    Cyble Appoints Former BookMyShow CTO Mahesh Vandi Chalil as Chief Product and Technology Officer

    GISEC 2023

    GISEC 2023: Microsoft Highlights Zero Trust Approach and Mixed Reality Policing Tools

    GISEC Global 2023

    GISEC Global 2023: ‘Take the Fight to Cyber Attackers’ Urges UAE Cybersecurity Council Paper

    Cyble in Forbes List

    Cyble Recognized by Forbes as One of America’s Best Startup Employers 2023

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    •  Cyber Security Webinar
    • World CyberCon Middle East 2023
    • Endorsed Events
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Firewall Daily

Elon Musk Twitter Takeover Opens Gates for Scammers Targeting Verified Profiles

Editorial by Editorial
November 8, 2022
in Firewall Daily, Main Story, Vulnerabilities
0
Elon Musk Twitter Takeover Opens Gates for Scammers Targeting Verified Profiles
591
SHARES
3.3k
VIEWS
Share on LinkedInShare on Twitter

Indian journalists Arun Dev and Kavitha Muralidharan have verified “blue ticks” on Twitter and are sought after by thousands of their followers. As the fiasco around Elon Musk’s takeover of Twitter started to make rounds, and the Tesla CEO proposed an $8 fee for retaining the blue ticks, both Arun and Kavitha were greeted with a link to the ‘Removal Notice.’ Going down the rabbit hole, Arun and Kavitha figured out these were cyber criminals at play leveraging the new global buzz.

Arun Dev and Kavitha Muralidharan were among the thousands of verified badge holders targeted by cybercriminals. Many verified Twitter users have reported getting phishing emails from scammers pretending to be from the official Twitter team. Most of these emails contain the old phishing trick, purposely created to lure victims trying to save their verified profiles on the platform.

You might also like

Fake Accounts Are a Bigger Problem Than Businesses Realize

Creal Information Stealer Phish Out Cryptocurrency Users

Mozilla Foundation Releases New Advisory on Thunderbird Vulnerability

These scamsters are relentless, and making the best of Twitter trends. pic.twitter.com/Tu6MnQyEWu

— Arun Dev (@ArunDev1) October 29, 2022

.@verified @Twitter pic.twitter.com/vzhSP1Vfrv

— Kavitha Muralidharan (@kavithamurali) October 29, 2022

The scammers send emails warning users of “Verified” profiles, persuading them to pay a monthly subscription to keep the verified profile badge unless they are popular in their respective communities. According to a few reported emails, the scammers are offering a subscription package of $19.99 per month, which will be initiated after November 2, 2022.

Since Twitter has thousands of verified accounts created by people who are not famous or well-known in the influencer markets, these scammers are targeting them via emails from accounts that mimic Twitter’s official emails.

Once the users click on an email link, they are redirected to the fake Google form instead of the official Twitter support pages. The user is then pursued to enter their username, password, and phone numbers on this form. While Arun was safe as he had enabled multi-factor authentication for his account, Kavitha had grown suspicious of the number of followers on Twitter.

Scammers become active after Elon Musk’s Twitter takeover

According to cybersecurity researcher Graham Cluley, “The world’s richest man’s plans for the news junkie’s favorite social network inevitably get a great deal of attention. Not everyone will know the details of what Elon Musk might be planning for Twitter, but they will certainly be aware that it’s a hot topic.”

In an exclusive interaction with The Cyber Express, Graham Cluley noted the severity of hijacking the Twitter account. He said, “Well, not only could your Twitter account be hijacked by someone else – but they might also post malicious content to your followers.  For instance, a scammer could post a link that attempts to steal the password of other Twitter users or install malware. In addition, a scammer could try to trick you into handing over financial information – such as your payment card details.”

“The only benefit historically [of a blue tick] is that it has helped give you greater confidence that the person is who they say they are.  Celebrities, in particular, have suffered from scammers creating “copycat” accounts in their name,” he added.

Verified users beware! Scammers are exploiting Twitter turmoil caused by Elon Musk's takeoverhttps://t.co/sc8KEeqGNb

— Graham Cluley 🇺🇦 (@gcluley) November 3, 2022

Among the best practices for users, Cluley suggested, “Always check the link goes to the domain you’re expecting, be on your guard against suspicious messages, use a password manager that enters your password for you rather than typing it in by hand (these will check that you are on the legitimate website), never share sensitive information you feel uncomfortable with (payment details, etc.), use different passwords for every website you access and enable multi-factor authentication.”

With Elon Musk’s recent declaration, many verified Twitter users are displeased. He doesn’t care if they like it or not, as long as they pay $8 a month to maintain the status quo. According to Musk, the company has expenses and requires payment from its users.

Several experts have also called it a genius move that would make Twitter profitable. At the same time, others have shared their concerns on companies like Facebook, Instagram, and even TikTok, following suit and charging their verified badge users.

This is not the first time Elon Musk’s social media posts have created controversies on the internet. The Tesla CEO previously Tweeted a statement about Tesla’s plans to no longer accept the cryptocurrency Bitcoin on May 13, 2022. Following the tweet, Bitcoin dropped from $54,819 to $45,700, its lowest since March 1, 2021.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • More
  • Click to email a link to a friend (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)

Related

Tags: Elon MuskThe Cyber ExpressThe Cyber Express NewsTwitterTwitter Takeover
Previous Post

Canada’s Maple Leaf Foods Confirms System Outage following Cyber Attack

Next Post

Russian Hackers Aim at US Elections; Been There, Done That, Says Oligarch

Editorial

Editorial

The Cyber Express is a publication that aims to provide the latest news and analysis about the information security industry. The news comes from a variety of sources and is updated regularly so that readers can stay up to date with the latest happenings in this rapidly growing field.

Related Posts

Fake Accounts
Features

Fake Accounts Are a Bigger Problem Than Businesses Realize

by Editorial
April 2, 2023
Firewall Daily

Creal Information Stealer Phish Out Cryptocurrency Users

by Vishwa Pandagle
April 1, 2023
New Advisory on Thunderbird Vulnerability
Firewall Daily

Mozilla Foundation Releases New Advisory on Thunderbird Vulnerability

by Ashish Khaitan
April 1, 2023
Hacktivism
Firewall Daily

Hacktivism and The New Age of Cyber Warfare

by Editorial
April 1, 2023
3CX
Cybersecurity News

Global 3CX Telephone App Users at Risk, CEO Blames ‘Upstream Library’

by Chandu Gopalakrishnan
March 31, 2023
Next Post
Yevgeny Prigozhin

Russian Hackers Aim at US Elections; Been There, Done That, Says Oligarch

Latest Issue is Out. Subscribe Now

Download Now

CRIL


Follow Us On Google News

Never miss an update. Subscribe!

* indicates required

Top 10 Cybersecurity Jobs

Categories

About The Cyber Express

The Cyber Express

Cyber Security News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

Follow The Cyber Express

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

For Sponsorship/Event Partnership: [email protected]xpress.com

For Conferences related information: [email protected]

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
555 North Point Center E
Alpharetta, GA 30022, USA.

Tel: (678) 578-8838

Events: +1 (678) 578-4140

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

Tel: (678) 578-8838

Events: +1 (678) 578-4140

Subscribe to Our Feed

RSS Feeds

Follow Us On Google News

© 2022 The Cyber Express (Cyber Security News and Magazine) | By Cyble Inc.

No Result
View All Result
  • Firewall Daily
  • Business News
  • Cyber Essentials
  • Features
  • Cyber Security Magazine
  • Events
    • World CyberCon Middle East 2023
    •  Cyber Security Webinar

© 2022 The Cyber Express (Cyber Security News and Magazine) | By Cyble Inc.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.