Fast execution, robust charts, clean risk controls.
👉 Open account →
COINOTAG recommends • Exchange signup
🚀 Smooth orders, clear control
Advanced order types and market depth in one view.
👉 Create account →
COINOTAG recommends • Exchange signup
📈 Clarity in volatile markets
Plan entries & exits, manage positions with discipline.
👉 Sign up →
COINOTAG recommends • Exchange signup
⚡ Speed, depth, reliability
Execute confidently when timing matters.
👉 Open account →
COINOTAG recommends • Exchange signup
🧭 A focused workflow for traders
Alerts, watchlists, and a repeatable process.
👉 Get started →
COINOTAG recommends • Exchange signup
✅ Data‑driven decisions
Focus on process—not noise.
👉 Sign up →
X account takeover phishing is a sophisticated campaign that hijacks crypto personalities’ X accounts by abusing X app authorizations to bypass passwords and 2FA, granting full account control when users mistakenly approve a spoofed app request; revoke suspicious connected apps immediately.
Spoofed app authorization: attackers use a fake “Calendar” app to request broad permissions.
The scam exploits X’s preview metadata and visually legitimate links to trick targets into authorizing access.
Security researchers report active incidents; revoke unknown connected apps via X settings to remediate.
X account takeover phishing steals access via app authorizations, bypassing 2FA; check connected apps and revoke suspicious ones now. Read how to protect your account.
What is the X account takeover phishing campaign?
X account takeover phishing is an attack that hijacks X (formerly Twitter) accounts by abusing the platform’s app authorization flow. Attackers present a spoofed app authorization prompt—often disguised via convincing metadata previews—so victims grant excessive permissions and enable full account control.
COINOTAG recommends • Professional traders group
💎 Join a professional trading community
Work with senior traders, research‑backed setups, and risk‑first frameworks.
👉 Join the group →
COINOTAG recommends • Professional traders group
📊 Transparent performance, real process
Spot strategies with documented months of triple‑digit runs during strong trends; futures plans use defined R:R and sizing.
👉 Get access →
COINOTAG recommends • Professional traders group
🧭 Research → Plan → Execute
Daily levels, watchlists, and post‑trade reviews to build consistency.
👉 Join now →
COINOTAG recommends • Professional traders group
🛡️ Risk comes first
Sizing methods, invalidation rules, and R‑multiples baked into every plan.
👉 Start today →
COINOTAG recommends • Professional traders group
🧠 Learn the “why” behind each trade
Live breakdowns, playbooks, and framework‑first education.
👉 Join the group →
COINOTAG recommends • Professional traders group
🚀 Insider • APEX • INNER CIRCLE
Choose the depth you need—tools, coaching, and member rooms.
👉 Explore tiers →
How does the phishing method bypass two-factor authentication?
The attack bypasses 2FA by using X’s OAuth-style authorization endpoint rather than stealing credentials. Victims are redirected to an X authorization page that requests broad permissions for a malicious app whose name visually mimics a trusted app using lookalike characters.
Technical signs include: brief display of a suspicious URL before redirect, app names with Cyrillic lookalikes, and permission lists unrelated to the app’s stated function (for example, a calendar app requesting posting and profile control).
COINOTAG recommends • Exchange signup
📈 Clear interface, precise orders
Sharp entries & exits with actionable alerts.
👉 Create free account →
COINOTAG recommends • Exchange signup
🧠 Smarter tools. Better decisions.
Depth analytics and risk features in one view.
👉 Sign up →
COINOTAG recommends • Exchange signup
🎯 Take control of entries & exits
Set alerts, define stops, execute consistently.
👉 Open account →
COINOTAG recommends • Exchange signup
🛠️ From idea to execution
Turn setups into plans with practical order types.
👉 Join now →
COINOTAG recommends • Exchange signup
📋 Trade your plan
Watchlists and routing that support focus.
👉 Get started →
COINOTAG recommends • Exchange signup
📊 Precision without the noise
Data‑first workflows for active traders.
👉 Sign up →
A new, hard-to-spot phishing campaign is hijacking crypto personalities’ X accounts by abusing X’s app authorization system to bypass passwords and 2FA.
COINOTAG recommends • Traders club
⚡ Futures with discipline
Defined R:R, pre‑set invalidation, execution checklists.
👉 Join the club →
COINOTAG recommends • Traders club
🎯 Spot strategies that compound
Momentum & accumulation frameworks managed with clear risk.
👉 Get access →
COINOTAG recommends • Traders club
🏛️ APEX tier for serious traders
Deep dives, analyst Q&A, and accountability sprints.
👉 Explore APEX →
COINOTAG recommends • Traders club
📈 Real‑time market structure
Key levels, liquidity zones, and actionable context.
👉 Join now →
COINOTAG recommends • Traders club
🔔 Smart alerts, not noise
Context‑rich notifications tied to plans and risk—never hype.
👉 Get access →
COINOTAG recommends • Traders club
🤝 Peer review & coaching
Hands‑on feedback that sharpens execution and risk control.
👉 Join the club →
A new sophisticated phishing campaign is targeting the X accounts of crypto personalities, using tactics that bypass two-factor authentication and appear more credible than traditional scams.
According to a Wednesday X post by crypto developer Zak Cole, a new phishing campaign leverages X’s own infrastructure to take over the accounts of crypto personalities. “Zero detection. Active right now. Full account takeover,” he said.
Cole highlighted that the attack does not involve a fake login page or password stealing. Instead, it leverages X application support to gain account access while also bypassing two-factor authentication.
MetaMask security researcher Ohm Shah also confirmed seeing the attack “in the wild,” suggesting a broader campaign, and an OnlyFans model was also targeted by a less sophisticated version of the attack.
COINOTAG recommends • Exchange signup
📈 Clear control for futures
Sizing, stops, and scenario planning tools.
👉 Open futures account →
COINOTAG recommends • Exchange signup
🧩 Structure your futures trades
Define entries & exits with advanced orders.
👉 Sign up →
COINOTAG recommends • Exchange signup
🛡️ Control volatility
Automate alerts and manage positions with discipline.
👉 Get started →
COINOTAG recommends • Exchange signup
⚙️ Execution you can rely on
Fast routing and meaningful depth insights.
👉 Create account →
COINOTAG recommends • Exchange signup
📒 Plan. Execute. Review.
Frameworks for consistent decision‑making.
👉 Join now →
COINOTAG recommends • Exchange signup
🧩 Choose clarity over complexity
Actionable, pro‑grade tools—no fluff.
👉 Open account →
How do attackers craft a credible phishing message?
The campaign begins with a direct message that appears to show a legitimate Google Calendar link because X generates a preview from the target page’s metadata. The visible preview fools recipients into trusting the destination.
In reported incidents the displayed domain looked like calendar.google.com in the preview, while the actual link pointed to a lookalike domain such as x(.)ca-lendar(.)com. The malicious page then redirects to an X authorization endpoint requesting app permissions.
COINOTAG recommends • Members‑only research
📌 Curated setups, clearly explained
Entry, invalidation, targets, and R:R defined before execution.
👉 Get access →
COINOTAG recommends • Members‑only research
🧠 Data‑led decision making
Technical + flow + context synthesized into actionable plans.
👉 Join now →
COINOTAG recommends • Members‑only research
🧱 Consistency over hype
Repeatable rules, realistic expectations, and a calmer mindset.
👉 Get access →
COINOTAG recommends • Members‑only research
🕒 Patience is an edge
Wait for confirmation and manage risk with checklists.
👉 Join now →
COINOTAG recommends • Members‑only research
💼 Professional mentorship
Guidance from seasoned traders and structured feedback loops.
👉 Get access →
COINOTAG recommends • Members‑only research
🧮 Track • Review • Improve
Documented PnL tracking and post‑mortems to accelerate learning.
👉 Join now →
The phishing link is in the message. Source: Zak Cole
The fake app presented to users appears as “Calendar,” but contains two Cyrillic characters that visually match Latin letters, making it technically distinct from the real Calendar app in X’s system. When granted, the app receives extensive permissions including posting, deleting, following, and profile changes.
Phishing site’s metadata. Source: Zak Cole
When would a user notice the attack?
Signs to watch for include a fraction-of-a-second display of a suspicious URL before redirect, an authorization prompt requesting unrelated permissions, and an unexpected final redirect (reports note a redirect to calendly.com despite a Google Calendar preview). These inconsistencies are red flags.
COINOTAG recommends • Exchange signup
🎯 Focus on process over noise
Plan trades, size positions, execute consistently.
👉 Sign up →
COINOTAG recommends • Exchange signup
🛠️ Simplify execution
Keep decisions clear with practical controls.
👉 Get started →
COINOTAG recommends • Exchange signup
📊 Make data your edge
Use depth and alerts to avoid guesswork.
👉 Open account →
COINOTAG recommends • Exchange signup
🧭 Be prepared, not reactive
Turn setups into rules before you trade.
👉 Create account →
COINOTAG recommends • Exchange signup
✍️ Plan first, then act
Entries, exits, and reviews that fit your routine.
👉 Join now →
COINOTAG recommends • Exchange signup
🧩 Consistency beats intensity
Small, repeatable steps win the long run.
👉 Sign up →
Security researcher guidance recommends checking X connected apps and revoking any unknown or suspicious apps, particularly any labeled “Calendar” or similar variants using lookalike characters.
Phishing X authorization request. Source: Zak Cole
COINOTAG recommends • Premium trading community
🏛️ WAGMI CAPITAL — Premium Trading Community
Strategic insights, exclusive opportunities, professional support.
👉 Join WAGMI CAPITAL →
COINOTAG recommends • Premium trading community
💬 Inner Circle access
See members share real‑time PnL and execution notes in chat.
👉 Apply for Inner Circle →
COINOTAG recommends • Premium trading community
🧩 Turn theses into trades
Reusable templates for entries, risk, and review—end to end.
👉 Join the club →
COINOTAG recommends • Premium trading community
💡 Long‑term mindset
Patience and discipline over noise; a process that compounds.
👉 Get started →
COINOTAG recommends • Premium trading community
📚 Education + execution
Courses, playbooks, and live market walkthroughs—learn by doing.
👉 Get access →
COINOTAG recommends • Premium trading community
🔒 Members‑only research drops
Curated analyses and private briefings—quality over quantity.
👉 Join WAGMI CAPITAL →
Frequently Asked Questions
How do I check connected apps on X?
Open your X account settings and navigate to Connected apps. Review the list and revoke any unfamiliar or unused apps immediately. Prioritize revoking apps named “Calendar” or similarly spelled variants.
What immediate steps stop a takeover?
Revoke malicious app access in X connected apps, change account passwords, enable strong authentication, and review recent account activity. If you lose access, contact platform support and document suspicious DMs and authorization requests.
Detection tips: Look for mismatched previews, odd URLs, Cyrillic lookalike characters, and unrelated permission requests.
Remediation: Revoke suspicious connected apps, change credentials, and audit recent activity; prioritize accounts of public crypto figures.
Conclusion
This X account takeover phishing campaign demonstrates a shift toward authorization-based hijacking that bypasses traditional password and 2FA protections. COINOTAG recommends immediate checks of connected apps, prompt revocation of suspicious permissions, and routine security hygiene to limit exposure.