Advanced Phishing Attacks Put X Accounts at Risk

Summary: Users of social media platform X (formerly Twitter) are at risk of account takeovers despite using two-factor authentication methods, as hackers can exploit vulnerabilities in these security measures. Researchers from eSentire warn that sophisticated attacks, including SIM swapping and adversary-in-the-middle tactics, can bypass even the strongest authentication methods.

Threat Actor: Hackers | hackers
Victim: High-profile individuals and brands | high-profile individuals and brands

Key Point :

  • Account takeovers on X can occur even with security keys or passkeys due to vulnerabilities in the platform’s authentication methods.
  • Hackers utilize techniques like SIM swapping and adversary-in-the-middle attacks to intercept authentication codes.
  • High-profile accounts, including those of celebrities and brands, have been targeted to promote cryptocurrency scams.
  • TRU researchers found that many online retailers and software services are also vulnerable to similar attacks.
  • Experts recommend adopting stronger authentication methods and disabling insecure multi-factor authentication options to enhance security.

Users of social media site X (formerly Twitter) risk having their accounts hacked, even if they have two-factor authentication set up, according to eSentire.

Researchers at eSentire’s Threat Research Unit (TRU) found that account takeover was still possible, even though X accounts use security keys or passkeys. X’s own security features allow strong authentication to be bypassed, they warn.

As well security keys or passkeys, X users can also use SMS codes or an authenticator application to access their accounts.

However, hackers can easily bypass these methods, either through an adversary-in-the-middle (AiTM) attack, intercepting or tricking users into revealing their authentication codes or though SIM swapping. This redirects the authentication code to the attacker’s phone.

The US actor Sydney Sweeny had her X account hacked in July, through a SIM-swapping scam. Other victims of X account takeovers include Lara and Tiffany Trump, the rock band Metallica and senior staff at McDonalds.

Read more about SIM-swapping attacks: SEC Confirms SIM Swap Attack Behind X Account Takeover

Crypto-Driven Attacks

“In the past eight months, there have been numerous X accounts that have been breached by hackers,” Spence Hutchinson, TRU threat intelligence researcher, told Infosecurity.

“These high-profile accounts were commonly breached to promote cryptocurrency scams or phishing links to thousands of their followers.”

Many of the attacks, including those against the Trumps and Metallica, promoted cryptocurrency schemes.

According to Hutchinson, the way X allows users to sign in using an authenticator application or SMS code undermines the use of security keys and passkeys.

“While traditional 2FA methods like SMS codes, authentication apps and backup codes add a small security improvement over passwords, they are no defense against sophisticated modern phishing attacks, such as AiTM attacks,” he said.

Online Retailers and Software Services Vulnerable

TRU researchers warned that it is not only X accounts that are vulnerable. The team found that a number of software services and online retailers’ security keys or passkeys through a technique they term “authentication method redaction” (AMR).

To carry out an AMR attack, the hacker blocks the site’s security or passkey option, forcing users to sign in with an email address and password instead. TRU recommends the use of stronger protections, such as passkeys or FIDO2 hardware authenticators, and disabling insecure MFA access methods.

“These breaches highlight the need for a robust and secure authentication posture that takes into account the most up-to-date measures to log in,” Don Tait, senior analyst for identity cybersecurity at Omdia told Infosecurity.

“Not all authentication methods are the same. Taking advantage of the best authentication methods will minimize the chances of getting breached.”

Image credit: BongkarnGraphic / Shutterstock.com

Source: https://www.infosecurity-magazine.com/news/phishing-x-accounts-risk