• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  News  /  The truth about the Twitter cryptocurrency giveaway
The truth about the Twitter cryptocurrency giveaway
10 November 2018

The truth about the Twitter cryptocurrency giveaway

Written by Ankita Ashesh
Ankita Ashesh
News
1
Share

Whether you like him or dislike him, one thing you can’t disagree with is that Elon Musk, the man behind Tesla and SpaceX, is a bonafide star. What he says makes news and his every utterance becomes a headline.

So obviously earlier in November, when he suddenly announced that he was stepping down from Tesla and giving away 10,000 BTC, it left the cryptocurrency world reeling.

This was his exact tweet: “I’m giving 10000 Bitcoin (BTC) to all community! I left the post of director of Tesla, thank you all for your suppoot! I decided to make the biggest crypto-giveaway in the world, for all my readers who use Bitcoin. Participate in giveaway – m-tesla.me” with an image of a QR code.

Imposter syndrome

The name of the Twitter account was “Elon Musk” and it had the blue Twitter verified mark. It was also a promoted tweet. But the handle was a little strange – it was @capgemini_aust, an account that looked like it belonged to the global consulting firm, Capgemini.

And that’s when things started to unravel. This wasn’t Elon Musk, the billionaire who was tweeting. This was a hacker who had hacked into Capgemini Australia’s verified Twitter account, changed the name to “Elon Musk” and then tweeted this out, even paying money to promote it. In effect, this was a daring, very well-affected scam which had confused millions.

An organized scam

As it turned out, this wasn’t the only one. Throughout Twitter over the past month, plenty of businesses, including a UK clothing brand and a book & a record label, have been hijacked to impersonate Elon Musk and post about this cryptocurrency giveaway. This has left these accounts scrambling with Capgemini forced out to put out a statement: “We are aware that a number of Twitter accounts at various organizations have been impacted by this scam and the Capgemini Australia account was among them. It’s in the process of being restored and no Capgemini client operations have been adversely impacted.”

Elon Musk wasn’t the only victim of impersonation.  Other prominent personalities who were impersonated by malicious criminals on Twitter with the promise of a cryptocurrency giveaway were Bill Gates, John McAfee, Vitalik Buterin and many others. There was an entire ecosystem of these impersonated accounts using promoted tweets to talk about the cryptocurrency giveaway with bots also responding to make it look authentic.

Target and Google targeted

Twitter did step into action banning all these impersonated accounts but then a new trend emerged. The hackers forego impersonation and decided to hack into major high-profile accounts. These accounts included leading departmental store Target, British skincare brand The Body Shop, Universal Music Czech Republic and even the UNHSCR Serbia account. Perhaps the biggest incident was when the Twitter account of Google’s collaboration tool G Suite was also compromised.

All the compromised Twitter accounts only tweeted about the supposed cryptocurrency giveaway which indicates that this is all the form of an organized scam. And it’s quite clear that Twitters users have to be doubly careful and follow precautions like:

  • Twitter has an option to allow two-factor authentication which should ideally be checked as it allows for greater protection.
  • Do not blindly indulge in cryptocurrency giveaways whether you see them on Twitter or any other social media.
  • Don’t blindly trust what verified accounts from trusted brands are saying. The hackers want to take advantage of the trust you reposed in them.
  • Check your privacy settings on all social media and see the kind of information you’re transmitting
  • If you want to know more about Bitcoin and other cryptocurrencies, always do it from a safe source

As an IT security partner for your business, Seqrite provides comprehensive security from advanced cyber threats. To know more

 Previous PostObfuscated Equation Editor Exploit (CVE-2017-11882) spreading Haw...
Next Post  Everything you need to know about RBI’s Circular on Basic Secur...
Ankita Ashesh

About Ankita Ashesh

...

Articles by Ankita Ashesh »

Related Posts

  • CVE-2022-30190: Zero-day vulnerability “Follina” in MSDT exploited in the wild

    June 10, 2022
  • Zero-day Vulnerability

    Threat Advisory: CVE-2022-30190 ‘Follina’ – Severe Zero-day Vulnerability discovered in MSDT

    June 3, 2022
  • Advisory on Russia-Ukraine Conflict-Related Cyberattacks

    March 15, 2022
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies