trezor.io/start - Trezor Safe 3
Utilize the Trezor Suite app to instantly compare online exchanges and find the most advantageous offers for purchasing cryptocurrencies - directly from the app.
What we know
The breach of our X account has unfolded to be a sophisticated phishing attack, planned over the course of weeks.
From our investigation, we have understood that the attackers engaged in a calculated scheme that began on February 29, 2024, posing as a credible entity from the crypto space, complete with a well-crafted social media presence and a seemingly genuine interest in dialogue.
The impersonator, using an X handle with thousands of followers, approached our PR team over X, under the guise of scheduling an interview with our CEO.
Over several days, the conversation advanced with credible back-and-forth communication.
This set the stage for a call, that culminated in the sharing of a malicious link, disguised as a Calendly invite.
Our team member, upon clicking the link, was redirected to a page requesting X login credentials, a red flag that prompted immediate suspicion and cessation of the interaction.
The meeting was rescheduled.
At the time of the meeting, the attacker feigned technical issues and urged our team member to “authorize” joining the call. The authorization was however a prompt to connect the attacker’s Calendly app with our X account. In the urgency of the moment, our team member confirmed the connection. The breach has been traced in X’s authentication logs.
As the Calendly app was under the attacker’s possession, they were able to send the fraudulent tweets on our behalf.
Last updated