Fraudsters abuse Twitter APIs to monitor public tweets and pish cryptocurrency scams

Fraudsters use bots to monitor Tweets requesting support to MetaMask, TrustWallet, and other crypto wallets to respond with scams within seconds, BleepingComputer reports.

To launch these targeted attacks, scammers monitor all public Tweets fro specific keywords and phrases, such as “support”, “assistance” and “help”, paired with “MetaMask”, “Phantom”, “Yoro” and “TrustWallet”. Twitter bots are used to respond to these Tweets automatically, posing as a fake customer service representative offering a malicious link that steals the victim’s cryptocurrency wallet.

All scammers’ replies have the same purpose of stealing the recovery phrase of the victim’s wallet, which an attacker can use to import the wallet to their device. In order to steal recovery/seed phrases, threat actors set up support forms on Google Docs and other cloud platforms. These forms mimic a simple support form and ask the user for their email address, problem, and wallet recovery kit, as shown in the fake MetaMask support form below.

The post Fraudsters abuse Twitter APIs to monitor public tweets and pish cryptocurrency scams appeared first on IT Security Guru.

Recent Posts
Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Not readable? Change text. captcha txt