Crypto X (Twitter) account hacks on the rise: A deep dive into hacker scams

Crypto trends

In recent months, an increasing number of crypto projects, industry professionals, politicians, and celebrities have had their social media accounts hacked and used to spread scam messages. Some Bitget employees have also fallen victim to similar phishing attacks. After regaining access to their accounts, we conducted a thorough investigation and discovered that attackers are employing increasingly deceptive and hard-to-detect methods. This article aims to raise industry-wide awareness of these evolving security threats.
A Bitget employee targeted by phishing
In mid-May, a Bitget business development employee received a private message on X from someone posing as a potential partner, inviting him to discuss a collaboration. The two parties quickly scheduled a meeting, which proceeded as planned. During the call, the other party sent several installation files, claiming they were for "function testing", and encouraged the Bitget employee to run them.
In the following days, the employee began receiving messages from friends and industry contacts asking, "Did you send me a weird DM on X?" Realizing something was wrong, he promptly contacted Bitget's security team. Working together, they were able to recover the account using the linked email and other verification methods.
How hackers target crypto X accounts and profit from them
As we continued our security review, we uncovered the hacker's methods step by step, and how they turned these attacks into profit.
Step 1: The hacker uses a compromised account to send DMs, luring victims into a Telegram conversation under the pretense of a partnership.
❗Security tips:
|
Step 2: After the victim contacts the hacker on Telegram, the hacker proposes a video meeting and shares a file during the call.
❗Security tips:
|
Step 3: After gaining access to the victim's device, the hacker attempts to steal assets directly. Then, they use the victim's X and Telegram accounts to target more victims, sending scam messages that direct recipients to the same hacker-controlled Telegram account.
❗Security tips:
|
Step 4: Once the next victim engages with the hacker on Telegram, the scam is tailored based on the hacker's assumed identity.
❗Security tips:
|
Summary
The methods described in this article still revolve around a familiar core tactic: planting trojans through malicious file downloads to gain control of a victim's device. What's new, however, is how much more sophisticated and deceptive the tactics have become:
-
Hackers now use compromised, verified X accounts to send DMs, significantly increasing credibility and the scam's success rate.
-
Messages are deleted immediately after being sent, so account owners often remain unaware of any breach. This allows hackers to operate undetected for longer. In the past, hackers would post scam tweets right away — such as fake giveaways or links to scam tokens — which, while effective for quick returns, also alerted the account owner and the public much faster.
-
The Telegram accounts used to continue the scam are carefully spoofed, often with usernames and profiles that closely mimic those of real team members.
How to identify and prevent similar phishing attacks
-
Be wary of "official" invitations. Always verify the sender's identity through multiple channels. If it's someone you know, check whether your previous chat history is still intact before continuing the conversation.
-
Never download or open files sent by unknown parties. If you need to install meeting tools like Zoom or Teams, always download them directly from the official website. This is crucial.
-
During meetings, only allow access to your camera and microphone. Never grant additional permissions that could enable remote access to your device.
-
Never leave your computer unattended during a call. If you must step away, have someone else monitor the screen to prevent hackers from accessing your device while you're away.
-
Do not back up your seed phrases on your computer or mobile phone. Enable multi-factor authentication (MFA) wherever possible.
-
For any device that manages funds, use an iPhone updated to the latest version, enable Lockdown Mode, and avoid using it for external communication. Keep it separate from your work and social devices.
Account compromised? Act fast to minimize losses
Even the best security practices aren't foolproof. If your account is hacked, how quickly you respond can make all the difference.
-
Disconnect your computer from the internet and shut it down to immediately cut off the hacker's access.
-
Check your fund security and wallet authorizations. If your local wallet (e.g., browser extensions or private key storage) has been exposed, transfer assets to a brand-new wallet using a newly generated private key. Do not reuse the same seed phrase.
-
Try recovering the account using another device or email. If you're still logged in somewhere, quickly use your linked email or phone number to reset your password and log out of all other sessions. Once your account is retrieved, immediately revoke all third-party login permissions to prevent hackers from continuing to manipulate your account.
-
Notify and alert your contacts. Warn others not to trust any recent DMs from you, and report the compromised account to help prevent a wider chain of victims.
The above cases are not isolated cases, but challenges that every user in the entire crypto industry may face. At Bitget, we not only build protection mechanisms, but also hope to work with you to truly turn "security awareness" into ability. Bitget's "Anti-Scam Month" is currently underway, and we have launched a series of anti-scam content and interactive activities. Welcome to the
activity page. Let's improve our ability to identify fraud and guard the security boundary together.
How to sell PIBitget lists PI – Buy or sell PI quickly on Bitget!
Trade nowRecommended
- Crypto trendsTop 7 Ways to Earn Money with Cryptocurrency in 2025Introduction Cryptocurrencies have revolutionized the financial sector, offering diverse opportunities for income generation. From passive income streams to active trading, the digital asset space presents numerous avenues for investors. Understanding these methods is crucial for navigating the dynamic crypto market effectively. What Is Cryptocurrency? Cryptocurrency is a form of digital or virtual currency that uses cryptography for security and operates on decentralized networks based on block
2025-06-04
- Crypto trendsWhat's on Bitget Leaders' Bookshelves? The Books That Inspire Bitget’s Leaders At Bitget, we believe the best ideas often come from the pages of great books. For World Book Day, we asked three of our leaders to share the reads that shape their thinking—the ones they return to again and again. No jargon, no fluff—just genuine recommendations that might spark your next great idea too. Gracy Chen, CEO – Building the Future Gracy’s book choices reflect her unique perspective—where deep crypto knowledge meets sharp business strategy.
2025-04-16
- Crypto trends10 Must-Read Crypto Books for 2025: Flip the Page, Build the Future "The best traders and builders don’t just predict the future—they read it." This World Book Day, Bitget bridges the gap between literature and blockchain by spotlighting the books that shaped crypto’s revolution. Whether you’re a trader, builder, or curious learner, these 10 essential reads will equip you with the knowledge to navigate—and even shape—the digital asset landscape in 2025 and beyond. The Builder's Library 1. Mastering Bitcoin by Andreas M. Antonopoulos For: The technically curio
2025-04-16
We offer all of your favorite coins!
Buy, hold, and sell popular cryptocurrencies such as BTC, ETH, SOL, DOGE, SHIB, PEPE, the list goes on. Register and trade to receive a 6200 USDT new user gift package!
Trade nowHow to sell PIBitget lists PI – Buy or sell PI quickly on Bitget!
Trade now