Who are the X-account hunters? How they steal digital identities and followers
These attacks are often handled automatically by systems set up by criminals trying to collect some money by exploiting famous names
4' min read
4' min read
A few days ago, cybercriminals obtained access to Defence Minister Crosetto's X account (formerly Twitter) and used it to post two messages aiming, the first, to obtain cryptocurrency donations for Giorgio Armani's funeral and, the second, to obtain donations to support the people of Gaza. There is much speculation as to who carried out the attack, but judging from what the minister himself said, it would not appear to be an 'ad personam' attack as it has all the characteristics of a common mass attack. These attacks are often carried out automatically by systems set up by criminals who try to collect some money by exploiting famous names in order to disseminate requests for money for seemingly noble topics. In the past, there have been many cases of similar attacks conducted against accounts of famous people, ranging from the footballer Mbappé to the SEC, passing through various actors and singers to the former US president Barak Obama (which was, however, a high-profile technical attack).
Social network accounts have in fact become real tools with economic, reputational and political value, and those of X (the former Twitter) are among hackers' favourite targets, to be exploited for scams, propaganda or resale on the black market.
But how do they take possession of supposedly private accounts?
The techniques for are diverse, sometimes very sophisticated, and affect public figures as well as companies and ordinary users.
Classic phishing in various sauces, with multi-factor authentication circumvention
The most widespread scam is still the traditional phishing scam: an e-mail or chat message that imitates the official communication from X and warns, for instance, of an impending account suspension. By clicking on the link and entering credentials to 'keep the account active' or 'avoid suspension', the unsuspecting user sends them to a bogus site, delivering them into the hands of the criminals.

