New Attack Exploiting X/Twitter Advertising Display URL Feature to Trick Users

Cybersecurity researchers have uncovered a campaign that tricks users by displaying trusted domain names in advertisements while redirecting victims to malicious cryptocurrency scam websites. This technique was previously reported by Bleeping Computer in March 2024 with similar cryptocurrency scams spoofing other trusted domains like forbes.com, indicating that threat actors continue to successfully exploit this vulnerability despite its public disclosure. “This attack demonstrates how threat actors continue to find creative ways to abuse legitimate platform features,” noted Silent Push in their report. The most recent instance of this attack was discovered on May 1, 2025, when advertisements for a fictitious “Apple iToken” cryptocurrency began appearing on X/Twitter. Silent Push researchers identified this campaign through their threat monitoring systems and determined that the attack represents a significant evolution in social media-based financial scams. Their investigation revealed that the threat actors behind this campaign have created nearly 90 similar websites dating back to 2024, all featuring almost identical financial lures targeting cryptocurrency investors. The redirect chain ultimately led users to domains like “ipresale.world” and “itokensale.live” that mimicked Apple branding while promoting fictional cryptocurrency presales. The attack leverages a known loophole in X/Twitter’s URL handling system, allowing attackers to display one domain to X/Twitter’s crawlers while sending actual visitors to entirely different destinations. When X/Twitter’s crawler follows this link to generate the preview card for the advertisement, it sees the legitimate domain and displays “From CNN.com” in the ad. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. When users clicked the link, however, they were redirected to cryptocurrency scam websites with elaborate Apple-themed interfaces designed to steal funds. The campaign specifically targets users interested in cryptocurrency investments by impersonating Apple and falsely suggesting the company is launching a new digital token. This creates a complex redirection chain: X/Twitter ad → Bitly shortener → Second X/Twitter URL → Final malicious domain (ipresale.world or similar domains). As detailed in the Silent Push report, the attackers employ a multi-stage redirection technique that effectively circumvents X/Twitter’s verification systems. A sophisticated financial scam has emerged on X/Twitter, exploiting a critical vulnerability in the platform’s advertising display URL feature. The operation’s sophistication is evident in its infrastructure, with researchers identifying 22 different cryptocurrency wallet options for victims to send funds. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 08 May 2025 17:25:11 +0000


Cyber News related to New Attack Exploiting X/Twitter Advertising Display URL Feature to Trick Users

New Attack Exploiting X/Twitter Advertising Display URL Feature to Trick Users - Cybersecurity researchers have uncovered a campaign that tricks users by displaying trusted domain names in advertisements while redirecting victims to malicious cryptocurrency scam websites. This technique was previously reported by Bleeping ...
2 weeks ago Cybersecuritynews.com
How to Stop Advertisers From Tracking Your Teen Across the Internet | Electronic Frontier Foundation - At 13, children transition abruptly between two extremes—from potential helicopter parental surveillance to surveillance advertising that connects their online activity and search history to marketers serving targeted ads. The Children’s Online ...
7 months ago Eff.org
Researchers Released PoC For Windows Bluetooth Service RCE Vulnerability - Microsoft addressed a Remote code execution vulnerability on their Bluetooth service on March 2023 Patch Tuesday. This vulnerability could allow an unauthorized threat actor to run a certain function on the Windows Bluetooth driver, which could lead ...
10 months ago Cybersecuritynews.com
Electronic Frontier Foundation - Archiving tweets isn't just for Dril and former presidents. In its heyday, Twitter was an essential platform for activists, organizers, journalists, and other everyday people around the world to speak truth to power and fight for social justice. Its ...
1 year ago Eff.org
What’s The Difference Between Twitter and Mastodon? - Twitter and Mastodon have been the two major players in the social media landscape for some time. Both platforms offer a way for people to share information and interact with others, and both have millions of users worldwide. Depending on your goals ...
2 years ago Welivesecurity.com
Crypto drainer steals $59 million from 63k people in Twitter ad push - Google and Twitter ads are promoting sites containing a cryptocurrency drainer named 'MS Drainer' that has already stolen $59 million from 63,210 victims over the past nine months. According to blockchain threat analysts at ScamSniffer, they ...
1 year ago Bleepingcomputer.com
Attack Vector vs Attack Surface: The Subtle Difference - Cybersecurity discussions about "Attack vectors" and "Attack surfaces" sometimes use these two terms interchangeably. This article guides you through the distinctions between attack vectors and attack surfaces to help you better understand the two ...
2 years ago Trendmicro.com
Scammers Selling Twitter Gold Accounts Fueling Disinfo, Phishing - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
1 year ago Hackread.com
X Value Down By 79 Percent Since Elon Musk | Silicon UK - CNN, citing estimates from investment giant Fidelity, reported that X is now worth almost 80 percent less than two years ago when Elon Musk finally concluded his controversial acquisition in late October 2022. That is down from the $19.66 million the ...
7 months ago Silicon.co.uk
Hackers Advertising of Pulse Connect Secure VPN RCE 0-Day - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
11 months ago Cybersecuritynews.com
Hackers Exploiting Docusign With Phishing Attack To Steal Credentials - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 year ago Gbhackers.com
Hackers Trick Users to Install Malware Via Weaponized PDF - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 year ago Gbhackers.com
Chinese Hackers Exploiting VMware 0-Day Flaw Since 2021 - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 year ago Gbhackers.com
Akira Ransomware Exploiting Cisco Anyconnect Vulnerability - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 year ago Gbhackers.com
Scammers Weaponize Google Forms in New BazarCall Attack - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
1 year ago Hackread.com
New Attack Breaking VMs With Malicious Interrupts - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 year ago Gbhackers.com
New Wi-Fi 'SSID Confusion' Attack Let Attackers Connecting Malicious Network - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 year ago Cybersecuritynews.com
New Cyber Attack Targeting Facebook Business Accounts - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 year ago Cybersecuritynews.com
3 New State-Backed Gangs Target Govt Sectors with HEAT Attack Methods - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
10 months ago Hackread.com
New MOVEit Auth Bypass Vulnerability Under Attack Now, Patch Immediately - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
10 months ago Cybersecuritynews.com
New TicTacToe Malware Dropper Attacking Windows Users - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 year ago Gbhackers.com
New Linux Backdoor Attacking Linux Users Via Installation Packages - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 year ago Gbhackers.com
iPhone Spyware Exploits Obscure Chip Feature, Targets Researchers - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
1 year ago Hackread.com
Microsoft Disables App Installer After Feature is Abused for Malware - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
1 year ago Hackread.com
New XorDdos-Linked Linux RAT Krasue Targeting Telecom Firms - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
1 year ago Hackread.com

Cyber Trends (last 7 days)