Stolen Gold X accounts are increasingly being peddled on dark web, says report

Cybercrooks have increased the number of new or stolen Gold checkmarked accounts from the X/Twitter platform offered for sale; they are a valuable way for threat actors to push links to malware on the social media site through what users will see as a post from a trusted source.

There has been a surge of dark web posts selling accounts with X/Twitter Gold verification., say researchers at Singapore-based CloudSEK. A “strikingly similar series of advertisements” was also seen in channels on the Telegram messaging site, the report adds.

X/Twitter offers users the ability to buy Gold, Blue and Grey tickmarks for a monthly fee, to enhance the credibility of their brands. Grey checkmarks have been set aside for NGOs and government bodies.

Some of the Gold accounts being sold on the dark web are new, allowing a threat actor buying one to change its name to one similar to a brand and impersonate the company or individual. Others once were controlled by individuals or companies but have been taken over by brute-force login attacks.

Prices range from an average of 30 cents for a new account to $2,000 for an aged account converted into Gold (all prices in U.S. currency). Prices go up depending on the number of followers of an existing and stolen account.

The sale on the dark web of Gold accounts has been going on since last March. CloudSEK says the number of shops and service providers today offering them “is humongous.” Most can be detected by running simple Google Dork queries.

The researchers worry that with the increase in availability on the dark web of Gold accounts, a huge wave of phishing or disinformation attacks will soon follow.

Usually buyers have access to an account for 30 days, which is the standard duration of X/Twitter Gold subscriptions.

The damage a stolen or fabricated Gold account can do is tremendous. The report gives as an example the September 2023 takeover of an account of the co-founder of the Ethereum digital currency. The hacker exploited his large following by posting a deceptive message
offering free non-fungible tokens (NFTs) to unsuspecting users. The malicious link embedded in the tweet directed users to a fake website that could drain cryptocurrency from their wallets. Despite being active for about 20 minutes, the hackers managed to siphon off  US$691,000 in digital assets before removing the fraudulent post.

The most common targets are X/Twitter accounts of organizations, created before 2022, that have not been used in a while or have been abandoned. Hackers will try to brute force the account, and, if successful, change the recovery email and contact details so the original owner can’t regain control. Then the account is converted to Gold depending on the ask by buyers.

Another tactic of hackers is to gather Twitter-based logins from information stealer malware. These logins are then validated using configs and brute force methods that will provide a positive response for working accounts. Then, on hacker advertising forums and websites, threat actors announce the account for sale, convert it into Twitter Gold, and sell it for as low as US$800.

Organizations can avoid their X/Twitter accounts from being abused by ensuring dormant accounts are closed if they have been inactive for an extended period, the report says. To ensure login credentials aren’t stolen, organizations have to enforce best password protection practices. Monitoring the organization’s feed for signs of X/Twitter hacking, including fake profiles, unauthorized product listings, misleading advertisements, and malicious content is also vital.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Howard Solomon
Howard Solomon
Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for several of ITWC's sister publications including ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times. I can be reached at hsolomon [@] soloreporter.com

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now