Crypto X (Twitter) account hacks on the rise: A deep dive into hacker scams

Crypto trends

In recent months, an increasing number of crypto projects, industry professionals, politicians, and celebrities have had their social media accounts hacked and used to spread scam messages. Some Bitget employees have also fallen victim to similar phishing attacks. After regaining access to their accounts, we conducted a thorough investigation and discovered that attackers are employing increasingly deceptive and hard-to-detect methods. This article aims to raise industry-wide awareness of these evolving security threats.
A Bitget employee targeted by phishing
In mid-May, a Bitget business development employee received a private message on X from someone posing as a potential partner, inviting him to discuss a collaboration. The two parties quickly scheduled a meeting, which proceeded as planned. During the call, the other party sent several installation files, claiming they were for "function testing", and encouraged the Bitget employee to run them.
In the following days, the employee began receiving messages from friends and industry contacts asking, "Did you send me a weird DM on X?" Realizing something was wrong, he promptly contacted Bitget's security team. Working together, they were able to recover the account using the linked email and other verification methods.
How hackers target crypto X accounts and profit from them
As we continued our security review, we uncovered the hacker's methods step by step, and how they turned these attacks into profit.
Step 1: The hacker uses a compromised account to send DMs, luring victims into a Telegram conversation under the pretense of a partnership.
❗Security tips:
|
Step 2: After the victim contacts the hacker on Telegram, the hacker proposes a video meeting and shares a file during the call.
❗Security tips:
|
Step 3: After gaining access to the victim's device, the hacker attempts to steal assets directly. Then, they use the victim's X and Telegram accounts to target more victims, sending scam messages that direct recipients to the same hacker-controlled Telegram account.
❗Security tips:
|
Step 4: Once the next victim engages with the hacker on Telegram, the scam is tailored based on the hacker's assumed identity.
❗Security tips:
|
Summary
The methods described in this article still revolve around a familiar core tactic: planting trojans through malicious file downloads to gain control of a victim's device. What's new, however, is how much more sophisticated and deceptive the tactics have become:
-
Hackers now use compromised, verified X accounts to send DMs, significantly increasing credibility and the scam's success rate.
-
Messages are deleted immediately after being sent, so account owners often remain unaware of any breach. This allows hackers to operate undetected for longer. In the past, hackers would post scam tweets right away — such as fake giveaways or links to scam tokens — which, while effective for quick returns, also alerted the account owner and the public much faster.
-
The Telegram accounts used to continue the scam are carefully spoofed, often with usernames and profiles that closely mimic those of real team members.
How to identify and prevent similar phishing attacks
-
Be wary of "official" invitations. Always verify the sender's identity through multiple channels. If it's someone you know, check whether your previous chat history is still intact before continuing the conversation.
-
Never download or open files sent by unknown parties. If you need to install meeting tools like Zoom or Teams, always download them directly from the official website. This is crucial.
-
During meetings, only allow access to your camera and microphone. Never grant additional permissions that could enable remote access to your device.
-
Never leave your computer unattended during a call. If you must step away, have someone else monitor the screen to prevent hackers from accessing your device while you're away.
-
Do not back up your seed phrases on your computer or mobile phone. Enable multi-factor authentication (MFA) wherever possible.
-
For any device that manages funds, use an iPhone updated to the latest version, enable Lockdown Mode, and avoid using it for external communication. Keep it separate from your work and social devices.
Account compromised? Act fast to minimize losses
Even the best security practices aren't foolproof. If your account is hacked, how quickly you respond can make all the difference.
-
Disconnect your computer from the internet and shut it down to immediately cut off the hacker's access.
-
Check your fund security and wallet authorizations. If your local wallet (e.g., browser extensions or private key storage) has been exposed, transfer assets to a brand-new wallet using a newly generated private key. Do not reuse the same seed phrase.
-
Try recovering the account using another device or email. If you're still logged in somewhere, quickly use your linked email or phone number to reset your password and log out of all other sessions. Once your account is retrieved, immediately revoke all third-party login permissions to prevent hackers from continuing to manipulate your account.
-
Notify and alert your contacts. Warn others not to trust any recent DMs from you, and report the compromised account to help prevent a wider chain of victims.
The above cases are not isolated cases, but challenges that every user in the entire crypto industry may face. At Bitget, we not only build protection mechanisms, but also hope to work with you to truly turn "security awareness" into ability. Bitget's "Anti-Scam Month" is currently underway, and we have launched a series of anti-scam content and interactive activities. Welcome to the
activity page. Let's improve our ability to identify fraud and guard the security boundary together.
How to sell PIBitget lists PI – Buy or sell PI quickly on Bitget!
Trade nowRecommended
- Crypto trendsHow to verify Your Bitget Account in Nigeria: A Step-by-Step KYC GuidePrerequisites: What You Need Before Starting Your Bitget Verification - Download Bitget application on Playstore or app store - Prepare your NIN/BVN - Ensure you have proper lighting for accuracy of KYC information Introduction: Why KYC Verification is Important for Crypto Traders in Nigeria - Protecting Your Bitcoin, USDT, and Altcoin Investments - Staying Compliant with Nigeria’s CBN and Crypto Regulations In Nigeria, more people than ever are looking to trade Bitcoin, USDT, and other cryptoc
2025-08-12
- Crypto trendsHow to verify Your Bitget Account in Kenya: A Step-by-Step KYC GuidePrerequisites: - Download Bitget application on Playstore or app store - Prepare your National ID, Driving Licence or Passport - Ensure you have proper lighting for accuracy of KYC information Introduction If you’re looking to buy Bitcoin in Kenya, trade USDT, or cash out crypto to M-Pesa, completing your Bitget KYC verification is the first step. KYC (Know Your Customer) is not just about compliance with Kenyan regulations — it’s your gateway to higher withdrawal limits, faster P2P transaction
2025-08-12
- Crypto trendsHow to Verify Your Bitget Account in South Africa: A Step-by-Step KYC GuidePrerequisites: - Download Bitget application on Playstore or app store - Prepare your National ID, or Passport - Ensure you have proper lighting for accuracy of KYC information Introduction Why KYC Matters in Crypto? In the fast-growing world of crypto trading, trust and security are everything. Whether you're just getting started or are already trading on platforms like Bitget, verifying your account through KYC (Know Your Customer) is essential. For South African users, this process is streaml
2025-08-08
We offer all of your favorite coins!
Buy, hold, and sell popular cryptocurrencies such as BTC, ETH, SOL, DOGE, SHIB, PEPE, the list goes on. Register and trade to receive a 6200 USDT new user gift package!
Trade nowHow to sell PIBitget lists PI – Buy or sell PI quickly on Bitget!
Trade now