New targeted 𝕏 hijacking campaign just dropped. This one is more sophisticated than previous attempts 🧵

Apr 1, 2025 · 1:27 AM UTC

79
215
62
2,031
First, which always surprises me, they manage to land the phishing email in my Gmail inbox bypassing Spam filters. Gmail is usually so effective at weeding out phishing and spam that it has the opposite effect here: we tend to trust whatever lands on our inboxes.
8
3
1
169
The email contains my @⁠username and looks exactly like the HTML emails X sends. There are two things I usually look for: ▪️The `from` address ▪️The link destination of the CTA (in addition to the copy & look n' feel) They tried their best with `help…law-x⁠.com`. It's very subtle, you have to notice they have a `-` instead of a `.`
6
4
126
Admittedly cool thing they did, very elaborate: instead of linking directly to their website, they're weaponizing Google's AMP CDN 🤯 So, if we hover the link we see: https:⁠//cdn.ampproject.⁠org/c/s/…viewteam-x.com/rauchg/suppor… cdn.⁠ampproject⁠.org is owned by Google. They might have identified a way to piggyback on its authority and reduce the likelihood of spam filters. It also serves as another layer of obfuscation of the URL.
4
1
1
147
They did a good job with the page itself. The profile picture was inlined specifically for my 'personalized' URL (what an honor!) The X posts are from today and one of them is my 'keyboard cap' of the X logo, so it's somewhat believable that there'd be a content notice.
2
1
103
One important thing: you might assume that you're invulnerable to this attack because you have 2FA (either via app or SMS) But you'd be wrong. This is the 'coolest' part of the attack. After you submit your password…
3
80
…they start polling their servers behind the scenes. This is not 'fake time' they're adding. This is the opportunity for a human or AI agent to start logging in to X on your behalf. When they get to the next factor of authentication, this gate will flip from `pending` to either `2fa_sms_control` or `2fa_app_control`. At that point you'll go to your app and hand them the code for the account takeover to complete.
6
1
1
118
Based on the registrar and comments in the code, it's likely the same hacking group out of Turkey that has successfully hacked many prominent accounts on X in the past.
1
4
5
135
The usual suspects… Same mistakes of leaking server details, PHP E_NOTICE messages, and a new bonus: PDO exception errors (potential for SQL injections?) (Based on PHPSESSID cookie and the `users.username` reference, the username is likely stored in session, coming from the URL pathname pattern)
3
1
109
tl;DR: Attacks keep getting more targeted and more sophisticated. Exercise extreme caution when you click on anything from an email. You're not safe because you have 2FA. Reported to @turkticaretnet and @cloudflare who serve the phishing domain.
Replying to @rauchg
This one's been around for a bit now - it hit @LinusTech last year
1
43
It’s a new / diff version but similar
2
42
Replying to @rauchg
Wow, scammers are definitely getting better at this. We've even seen them use Google AMP in scam texts too:
This tweet is unavailable
Wow, good find
1
Replying to @rauchg
How is “contentlaw-x.com” sophisticated?
1
7
Bypassing Gmail is not easy to begin with, nor is timing the attack to steal both password and 2FA. The email and site are nearly pixel perfect. They probably have a crazy success rate
4
16
Replying to @rauchg
More importantly, how’s the lighthouse score?
1
56
Replying to @rauchg
vrrrrry niiiiiceee
26
Replying to @rauchg
Great thread
1
15
Replying to @rauchg
Why did you sensor the domain. It’s the most helpful part of this post. Reviewing the domain you can see that it’s not a domain from twitter team.
This tweet is unavailable
1
4
Replying to @rauchg
I worry so much for my parents 🥹 They’d never see it coming
5
Replying to @rauchg
I appreciate these posts, @rauchg
4
Replying to @rauchg
Did you get the ouath calendar phishing attempts? Those are devious
3
Replying to @rauchg
Very solid read Guillermo. Need more folks warning about this
1
2
Replying to @rauchg
even the highly sophisticated hackers are using cloudflare, must be nice
Replying to @rauchg
Amazing, thanks for taking the initiative to share this
Replying to @rauchg
Scary how advanced phishing tactics are getting
Replying to @rauchg
i don't think so
2
11
Replying to @rauchg
my fear is that my password manager would autofill one of these things.
3
10
Replying to @rauchg
Shoutout to @samedotdev
8
Replying to @rauchg
How do they find your email address? Did they just guess?
2
Replying to @rauchg
Model citizen journalism! 👏🙌
2
Replying to @rauchg
Probably built with @samedotdev
1
Replying to @rauchg
Awesome post!! 💪
1
Replying to @rauchg
this is gonna happen more and more with tools for generating UIs by AI
1
1