{"id":171936,"date":"2023-07-25T08:28:11","date_gmt":"2023-07-25T15:28:11","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=171936"},"modified":"2024-11-19T21:10:43","modified_gmt":"2024-11-20T05:10:43","slug":"scammers-follow-the-rebranding-of-twitter-to-x-to-distribute-malware","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/scammers-follow-the-rebranding-of-twitter-to-x-to-distribute-malware\/","title":{"rendered":"Scammers Follow the Rebranding of Twitter to X, to Distribute Malware"},"content":{"rendered":"<p><span class=\"TextRun SCXW118935910 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW118935910 BCX0\">Authored by<\/span><span class=\"NormalTextRun SCXW118935910 BCX0\">:<\/span><span class=\"NormalTextRun SCXW118935910 BCX0\"> Vallabh Chole and <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SpellingErrorHighlight SCXW118935910 BCX0\">Yerko<\/span> <span class=\"NormalTextRun SCXW118935910 BCX0\">Grbic<\/span><\/span><\/p>\n<p><span data-contrast=\"auto\">On July 23rd, 2023, Elon Musk announced that the social networking site, Twitter was rebranding as \u201cX\u201d. The news propelled Twitter and X to gain headlines and become the top trending topics on popular social media platforms.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Scammers pounced on this opportunity and started renaming various hacked YouTube and other social media accounts to \u201ctwitter-x\u201d and \u201ctwitter fund\u201d to promote scam links with new X branding.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-171937\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/1.png\" alt=\"\" width=\"1634\" height=\"398\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/1.png 1634w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/1-300x73.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/1-1024x249.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/1-768x187.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/1-1536x374.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/1-205x50.png 205w\" sizes=\"auto, (max-width: 1634px) 100vw, 1634px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em><span class=\"TextRun SCXW175959139 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW175959139 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW175959139 BCX0\"><span class=\"TextRun SCXW175959139 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW175959139 BCX0\" data-ccp-parastyle=\"caption\">1<\/span><\/span><\/span><span class=\"TextRun SCXW175959139 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW175959139 BCX0\" data-ccp-parastyle=\"caption\">. Twitter-X-themed<\/span><span class=\"NormalTextRun SCXW175959139 BCX0\" data-ccp-parastyle=\"caption\">\u00a0<\/span><span class=\"NormalTextRun SCXW175959139 BCX0\" data-ccp-parastyle=\"caption\">You<\/span><span class=\"NormalTextRun SCXW175959139 BCX0\" data-ccp-parastyle=\"caption\">T<\/span><span class=\"NormalTextRun SCXW175959139 BCX0\" data-ccp-parastyle=\"caption\">ube<\/span> <span class=\"NormalTextRun SCXW175959139 BCX0\" data-ccp-parastyle=\"caption\">Live Stream<\/span><span class=\"NormalTextRun SCXW175959139 BCX0\" data-ccp-parastyle=\"caption\"> by scammer<\/span><\/span><span class=\"EOP SCXW175959139 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/em><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-171951\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/2.jpg\" alt=\"\" width=\"1920\" height=\"1556\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/2.jpg 1920w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/2-300x243.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/2-1024x830.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/2-768x622.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/2-1536x1245.jpg 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/2-159x129.jpg 159w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><i>Figure 2. Twitter X Crypto Scam<\/i><\/strong><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span class=\"TextRun SCXW231272677 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW231272677 BCX0\">This <\/span><span class=\"NormalTextRun SCXW231272677 BCX0\">type of <\/span><\/span><a class=\"Hyperlink SCXW231272677 BCX0\" href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/crypto-scammers-exploit-elon-musk-speaks-on-cryptocurrency\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW231272677 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW231272677 BCX0\" data-ccp-charstyle=\"Hyperlink\">scam<\/span><\/span><\/a><span class=\"TextRun SCXW231272677 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"> <span class=\"NormalTextRun SCXW231272677 BCX0\">has been<\/span> <span class=\"NormalTextRun SCXW231272677 BCX0\">active <\/span><span class=\"NormalTextRun SCXW231272677 BCX0\">for <\/span><span class=\"NormalTextRun SCXW231272677 BCX0\">some <\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW231272677 BCX0\"><span class=\"TextRun SCXW231272677 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW231272677 BCX0\">time and<\/span><\/span><\/span><span class=\"TextRun SCXW231272677 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW231272677 BCX0\"> uses<\/span> <span class=\"NormalTextRun SCXW231272677 BCX0\">an <\/span><span class=\"NormalTextRun SCXW231272677 BCX0\">innovative approach to lure victims.<\/span><span class=\"NormalTextRun SCXW231272677 BCX0\"> To make this <\/span><span class=\"NormalTextRun SCXW231272677 BCX0\">scam<\/span> <span class=\"NormalTextRun SCXW231272677 BCX0\">more <\/span><span class=\"NormalTextRun SCXW231272677 BCX0\">authentic<\/span><span class=\"NormalTextRun SCXW231272677 BCX0\">,<\/span> <span class=\"NormalTextRun SCXW231272677 BCX0\">attackers <\/span><span class=\"NormalTextRun SCXW231272677 BCX0\">target<\/span><span class=\"NormalTextRun SCXW231272677 BCX0\"> famous<\/span><span class=\"NormalTextRun SCXW231272677 BCX0\"> Influencers with sponsorship emails <\/span><span class=\"NormalTextRun SCXW231272677 BCX0\">that <\/span><span class=\"NormalTextRun SCXW231272677 BCX0\">contain<\/span> password-stealing<span class=\"NormalTextRun SCXW231272677 BCX0\">\u00a0<\/span><span class=\"NormalTextRun SCXW231272677 BCX0\">malware as<\/span> <span class=\"NormalTextRun SCXW231272677 BCX0\">email <\/span><span class=\"NormalTextRun SCXW231272677 BCX0\">attachment<\/span><span class=\"NormalTextRun SCXW231272677 BCX0\">s<\/span><span class=\"NormalTextRun SCXW231272677 BCX0\">. When <\/span><span class=\"NormalTextRun SCXW231272677 BCX0\">password stealer<\/span><span class=\"NormalTextRun SCXW231272677 BCX0\"> malware<\/span><span class=\"NormalTextRun SCXW231272677 BCX0\"> is executed<\/span><span class=\"NormalTextRun SCXW231272677 BCX0\">,<\/span> <span class=\"NormalTextRun SCXW231272677 BCX0\">the <\/span><span class=\"NormalTextRun SCXW231272677 BCX0\">influencer<\/span><span class=\"NormalTextRun SCXW231272677 BCX0\">\u2019<\/span><span class=\"NormalTextRun SCXW231272677 BCX0\">s session <\/span><span class=\"NormalTextRun SCXW231272677 BCX0\">cookies (unique access token<\/span><span class=\"NormalTextRun SCXW231272677 BCX0\">s<\/span><span class=\"NormalTextRun SCXW231272677 BCX0\">) are <\/span><span class=\"NormalTextRun SCXW231272677 BCX0\">stolen and <\/span><span class=\"NormalTextRun SCXW231272677 BCX0\">uploaded<\/span> <span class=\"NormalTextRun SCXW231272677 BCX0\">to <\/span><span class=\"NormalTextRun SCXW231272677 BCX0\">attacker-controlled <\/span><span class=\"NormalTextRun SCXW231272677 BCX0\">systems<\/span><span class=\"NormalTextRun SCXW231272677 BCX0\">.<\/span><\/span><span class=\"EOP SCXW231272677 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-171965\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/3.png\" alt=\"\" width=\"1520\" height=\"702\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/3.png 1520w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/3-300x139.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/3-1024x473.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/3-768x355.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/3-205x95.png 205w\" sizes=\"auto, (max-width: 1520px) 100vw, 1520px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em><span class=\"TextRun SCXW187446381 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW187446381 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><span class=\"NormalTextRun SCXW187446381 BCX0\" data-ccp-parastyle=\"caption\">3.<\/span><span class=\"NormalTextRun SCXW187446381 BCX0\" data-ccp-parastyle=\"caption\"> Malware Flow<\/span><span class=\"NormalTextRun SCXW187446381 BCX0\" data-ccp-parastyle=\"caption\"> Chart<\/span><\/span><span class=\"EOP SCXW187446381 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span>\u00a0<\/em><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><span class=\"TextRun SCXW148447056 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW148447056 BCX0\">After the <\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">influencer<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">\u2019<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">s <\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">account has been compromised,<\/span> <span class=\"NormalTextRun SCXW148447056 BCX0\">the scammer <\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">start<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">s<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\"> to rename channel<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">s,<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\"> in this case to \u201cTwitter CEO\u201d and <\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">then the scammers start to<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\"> live stream <\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">an <\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">Elon<\/span> <span class=\"NormalTextRun SCXW148447056 BCX0\">M<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">usk video<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\"> on YouTube<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">. <\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">T<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">hey post web links <\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">for <\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">new <\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">scam<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\"> sites in <\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">chat,<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\"> and <\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">target YouTube<\/span> <span class=\"NormalTextRun SCXW148447056 BCX0\">accounts<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\"> with a <\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">large number of <\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">subscribers<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">. <\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">On <\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">other social media platforms<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">,<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\"> such as Instagram and Twitter<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">,<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\"> they use compromise<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">d<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\"> account<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">s<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\"> to follow <\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">users<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\"> and post screenshot<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">s<\/span> <span class=\"NormalTextRun SCXW148447056 BCX0\">with caption<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">s, such as<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\"> \u201cThanks <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW148447056 BCX0\">Mr.<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW148447056 BCX0\">E<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW148447056 BCX0\">lon&#8221;<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">. If we loo<\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW148447056 BCX0\"><span class=\"TextRun SCXW148447056 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW148447056 BCX0\">k for t<\/span><\/span><\/span><span class=\"TextRun SCXW148447056 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW148447056 BCX0\">hese terms<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\"> on <\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">Instagram,<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\"> we <\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">observe<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\"> thousands <\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">of <\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">similar <\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">post<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">s<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">. C<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">ompromised accounts<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\"> are also <\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">used<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\"> to post <\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">videos for software\/game applications<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">,<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\"> which are <\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">malware<\/span> <span class=\"NormalTextRun SCXW148447056 BCX0\">masquerading <\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">as <\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">legitimate<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\"> software or game<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">s<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">. <\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">These videos<\/span> <span class=\"NormalTextRun SCXW148447056 BCX0\">demonstrate<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\"> how to download and execute file<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">s<\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">, <\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">which are common <\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">password-stealing malware, and distributed through <\/span><span class=\"NormalTextRun SCXW148447056 BCX0\">compromised social media accounts.<\/span><\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Protection with McAfee+:<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/en-us\/identity-theft\/protection.html?path=blogs\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">McAfee+<\/span><\/a><span data-contrast=\"none\">\u00a0provides all-in-one online protection for your<\/span><span data-contrast=\"auto\">\u00a0identity, privacy, and security. With McAfee+, you\u2019ll feel safer online because you\u2019ll\u00a0<\/span><span data-contrast=\"auto\">have the tools, guidance, and support to take the steps to be safer online. <\/span><span data-contrast=\"auto\">McAfee protects against these types of scam sites with Web Advisor protection that detects malicious websites.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-171979\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/4.png\" alt=\"\" width=\"1453\" height=\"740\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/4.png 1453w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/4-300x153.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/4-1024x522.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/4-768x391.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/4-205x104.png 205w\" sizes=\"auto, (max-width: 1453px) 100vw, 1453px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em><span class=\"TextRun SCXW594582 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW594582 BCX0\" data-ccp-parastyle=\"caption\">Figure 4. McAfee <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW594582 BCX0\" data-ccp-parastyle=\"caption\">WebAdvisor<\/span><span class=\"NormalTextRun SCXW594582 BCX0\" data-ccp-parastyle=\"caption\"> detection<\/span><\/span><span class=\"EOP SCXW594582 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/em><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><span class=\"TextRun SCXW92868869 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW92868869 BCX0\">Below is <\/span><span class=\"NormalTextRun SCXW92868869 BCX0\">a <\/span><span class=\"NormalTextRun SCXW92868869 BCX0\">detection <\/span><span class=\"NormalTextRun SCXW92868869 BCX0\">heatmap<\/span><span class=\"NormalTextRun SCXW92868869 BCX0\"> for <\/span><span class=\"NormalTextRun SCXW92868869 BCX0\">scam<\/span><span class=\"NormalTextRun SCXW92868869 BCX0\"> URL\u2019s <\/span><span class=\"NormalTextRun SCXW92868869 BCX0\">targeting twitter-x and promoting crypto scams<\/span><span class=\"NormalTextRun SCXW92868869 BCX0\">.\u00a0<\/span><span class=\"NormalTextRun SCXW92868869 BCX0\">\u00a0<\/span><\/span><span class=\"EOP SCXW92868869 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-171993\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/5.png\" alt=\"\" width=\"1309\" height=\"568\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/5.png 1309w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/5-300x130.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/5-1024x444.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/5-768x333.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/5-205x89.png 205w\" sizes=\"auto, (max-width: 1309px) 100vw, 1309px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em><span class=\"TextRun SCXW221266241 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW221266241 BCX0\" data-ccp-parastyle=\"caption\">Figure 5. Scam URL Detection Heatmap<\/span><\/span><\/em><span class=\"EOP SCXW221266241 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-172007\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/6.png\" alt=\"\" width=\"1539\" height=\"955\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/6.png 1539w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/6-300x186.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/6-1024x635.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/6-768x477.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/6-1536x953.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/6-205x127.png 205w\" sizes=\"auto, (max-width: 1539px) 100vw, 1539px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em><span class=\"TextRun SCXW58575186 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW58575186 BCX0\" data-ccp-parastyle=\"caption\">Figure 6. Password stealer Heatmap<\/span><\/span><span class=\"EOP SCXW58575186 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/em><\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2><span data-contrast=\"auto\">Indicators of Compromise:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<table data-tablestyle=\"MsoNormalTable\" data-tablelook=\"1184\" aria-rowcount=\"5\">\n<tbody>\n<tr aria-rowindex=\"1\">\n<td data-celllook=\"65536\"><b><span data-contrast=\"auto\">Scam Site<\/span><\/b><span data-contrast=\"auto\">\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><b><span data-contrast=\"auto\">Crypto Type<\/span><\/b><span data-contrast=\"auto\">\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><b><span data-contrast=\"auto\">Wallet<\/span><\/b><span data-contrast=\"auto\">\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"2\">\n<td data-celllook=\"65536\"><span data-contrast=\"auto\">twitter-x[.]org<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"auto\">ETH\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"auto\">0xB1706fc3671115432eC9a997F802aC79CD7f378a<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"3\">\n<td data-celllook=\"65536\"><span data-contrast=\"auto\">twitter-x[.]org<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"auto\">BTC\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"auto\">1KtgaAjBETdcXiAdGsXJMePT4AEGWqtsug<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"4\">\n<td data-celllook=\"65536\"><span data-contrast=\"auto\">twitter-x[.]org<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"auto\">USDT\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"auto\">0xB1706fc3671115432eC9a997F802aC79CD7f378a<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"5\">\n<td data-celllook=\"65536\"><span data-contrast=\"auto\">twitter-x[.]org<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"auto\">DOGE\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"auto\">DLCmD43eZ6hPxZVzc8C7eUL4w8TNrBMw9J<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authored by: Vallabh Chole and Yerko Grbic On July 23rd, 2023, Elon Musk announced that the social networking site, Twitter&#8230;<\/p>\n","protected":false},"author":695,"featured_media":172036,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[5104],"coauthors":[4136],"class_list":["post-171936","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs","tag-twitter"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Scammers Follow the Rebranding of Twitter to X, to Distribute Malware | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Authored by: Vallabh Chole and Yerko Grbic On July 23rd, 2023, Elon Musk announced that the social networking site, Twitter was rebranding as \u201cX\u201d. The\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Scammers Follow the Rebranding of Twitter to X, to Distribute Malware | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Authored by: Vallabh Chole and Yerko Grbic On July 23rd, 2023, Elon Musk announced that the social networking site, Twitter was rebranding as \u201cX\u201d. The\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/scammers-follow-the-rebranding-of-twitter-to-x-to-distribute-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-25T15:28:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-20T05:10:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/300x200_Blog_Twitter-X.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/scammers-follow-the-rebranding-of-twitter-to-x-to-distribute-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/scammers-follow-the-rebranding-of-twitter-to-x-to-distribute-malware\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Scammers Follow the Rebranding of Twitter to X, to Distribute Malware\",\"datePublished\":\"2023-07-25T15:28:11+00:00\",\"dateModified\":\"2024-11-20T05:10:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/scammers-follow-the-rebranding-of-twitter-to-x-to-distribute-malware\/\"},\"wordCount\":451,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/scammers-follow-the-rebranding-of-twitter-to-x-to-distribute-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/300x200_Blog_Twitter-X.png\",\"keywords\":[\"twitter\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/scammers-follow-the-rebranding-of-twitter-to-x-to-distribute-malware\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/scammers-follow-the-rebranding-of-twitter-to-x-to-distribute-malware\/\",\"name\":\"Scammers Follow the Rebranding of Twitter to X, to Distribute Malware | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/scammers-follow-the-rebranding-of-twitter-to-x-to-distribute-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/scammers-follow-the-rebranding-of-twitter-to-x-to-distribute-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/300x200_Blog_Twitter-X.png\",\"datePublished\":\"2023-07-25T15:28:11+00:00\",\"dateModified\":\"2024-11-20T05:10:43+00:00\",\"description\":\"Authored by: Vallabh Chole and Yerko Grbic On July 23rd, 2023, Elon Musk announced that the social networking site, Twitter was rebranding as \u201cX\u201d. The\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/scammers-follow-the-rebranding-of-twitter-to-x-to-distribute-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/scammers-follow-the-rebranding-of-twitter-to-x-to-distribute-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/scammers-follow-the-rebranding-of-twitter-to-x-to-distribute-malware\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/300x200_Blog_Twitter-X.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/300x200_Blog_Twitter-X.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/scammers-follow-the-rebranding-of-twitter-to-x-to-distribute-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Scammers Follow the Rebranding of Twitter to X, to Distribute Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Scammers Follow the Rebranding of Twitter to X, to Distribute Malware | McAfee Blog","description":"Authored by: Vallabh Chole and Yerko Grbic On July 23rd, 2023, Elon Musk announced that the social networking site, Twitter was rebranding as \u201cX\u201d. The","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Scammers Follow the Rebranding of Twitter to X, to Distribute Malware | McAfee Blog","og_description":"Authored by: Vallabh Chole and Yerko Grbic On July 23rd, 2023, Elon Musk announced that the social networking site, Twitter was rebranding as \u201cX\u201d. The","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/scammers-follow-the-rebranding-of-twitter-to-x-to-distribute-malware\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2023-07-25T15:28:11+00:00","article_modified_time":"2024-11-20T05:10:43+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/300x200_Blog_Twitter-X.png","type":"image\/png"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/scammers-follow-the-rebranding-of-twitter-to-x-to-distribute-malware\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/scammers-follow-the-rebranding-of-twitter-to-x-to-distribute-malware\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Scammers Follow the Rebranding of Twitter to X, to Distribute Malware","datePublished":"2023-07-25T15:28:11+00:00","dateModified":"2024-11-20T05:10:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/scammers-follow-the-rebranding-of-twitter-to-x-to-distribute-malware\/"},"wordCount":451,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/scammers-follow-the-rebranding-of-twitter-to-x-to-distribute-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/300x200_Blog_Twitter-X.png","keywords":["twitter"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/scammers-follow-the-rebranding-of-twitter-to-x-to-distribute-malware\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/scammers-follow-the-rebranding-of-twitter-to-x-to-distribute-malware\/","name":"Scammers Follow the Rebranding of Twitter to X, to Distribute Malware | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/scammers-follow-the-rebranding-of-twitter-to-x-to-distribute-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/scammers-follow-the-rebranding-of-twitter-to-x-to-distribute-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/300x200_Blog_Twitter-X.png","datePublished":"2023-07-25T15:28:11+00:00","dateModified":"2024-11-20T05:10:43+00:00","description":"Authored by: Vallabh Chole and Yerko Grbic On July 23rd, 2023, Elon Musk announced that the social networking site, Twitter was rebranding as \u201cX\u201d. The","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/scammers-follow-the-rebranding-of-twitter-to-x-to-distribute-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/scammers-follow-the-rebranding-of-twitter-to-x-to-distribute-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/scammers-follow-the-rebranding-of-twitter-to-x-to-distribute-malware\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/300x200_Blog_Twitter-X.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/300x200_Blog_Twitter-X.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/scammers-follow-the-rebranding-of-twitter-to-x-to-distribute-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Scammers Follow the Rebranding of Twitter to X, to Distribute Malware"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/171936","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=171936"}],"version-history":[{"count":5,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/171936\/revisions"}],"predecessor-version":[{"id":204922,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/171936\/revisions\/204922"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/172036"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=171936"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=171936"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=171936"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=171936"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}