There is a newly found Twitter cryptocurrency scam. According to Bleeping Computer this new Twitter cybersecurity scam uses Twitter bots to identify users who post about cryptocurrency. Once identified, the bots will then tweet to the user pretending to be on a cryptocurrency support team, ready to help. The bot is hoping to trick the user into supplying confidential information, especially to a cryptocurrency account. This scam is another variant of a social engineering attack.

What is social engineering

According to Webroot, a cyber-resilience company, “Social engineering is the art of manipulating people so they give up confidential information.” The type of information targeted by social engineers can be anything from usernames and passwords, to credit and debit card numbers or other banking information, or intellectual property. Social engineering attacks can even attempt to access a computer to install malware.

Social engineering’s many forms

These attacks are not always easy to detect because they have many different forms. Some of the most common social engineering attack types are:

  • Phishing

Emails that typically ask for confidential information or require you to click a link or attachment. This ultimately allows a hacker access to your computer and software.

  • Vishing

Phone calls that trick recipients into divulging confidential information.

  • Fake Websites

Websites made to look like the real deal and trick users into clicking links or entering in their username and passwords.

In this particular case the attack is using a twitter account to impersonate a legitimate Twitter account looking to trick you.

Don’t fall victim

Since social engineering attacks try to trick or coerce people into giving confidential information, it is important to verify who you are speaking with or corresponding with prior to divulging any information to them.

For more information on small business cybersecurity check out Small Business, Big Threat today!

Subscribe to our monthly, email newsletter to stay up-to-date on the latest in cybersecurity!

Uncategorized