News

Security Experts Sound Alarm on New Phishing Campaign Targeting Crypto Influencers

2025 X Phishing Scam Targets Crypto Figures through Calendar Spoofing and Cyrillic Homographs

Written By : Kelvin Munene
Reviewed By : Manisha Sharma

Hackers have developed an advanced phishing scheme that targets leading members of the crypto community using X infrastructure. The attack exploits X’s app authorization system, allowing attackers to bypass both passwords and two-factor authentication.

Crypto developer Zak Cole first flagged the issue on Wednesday, warning that the attack results in complete account takeover with “zero detection.” Unlike conventional phishing attempts that rely on fake login pages, this method exploits X’s native application support to access accounts directly.

MetaMask researcher Ohm Shah confirmed spotting the attack “in the wild,” indicating a wider spread. A similar method targeted even non-crypto figures, including an OnlyFans model, showing the attack’s versatility.

The Phishing Method Relies on Metadata Spoofing

The crypto crime is initiated with a direct message in X, which has a link that previews a legitimate website. The connection shows calendar.google.com, but the connection is to “x(.)ca-lendar(.)com”, which was only registered a few days ago. The preview is misleading to users since X uses metadata to create its previews, which attackers use to display Google's official branding.

After clicking the link, the user is quietly redirected to a page that executes some code that takes them to an official-looking X login screen. There, a phishing program named Calendar requests account permission. 

A subtle visual illusion makes the name look identical to the real Google Calendar application. However, two of the letters are actually Cyrillic characters designed to trick the eye, making it harder for users to spot the difference.

The counterfeit app then requests sweeping permissions that would never be required by a calendar tool. It asks about the option to follow or unfollow accounts, edit profile information, and even post or delete something. These are over-access requests, and this is among the few signs that something is amiss.

Inconsistencies Reveal Possible Warning Signs

Another red flag appears after users grant access. Victims are also redirected to calendly.com as opposed to Google Calendar, which is not consistent with the preview and the actual destination. According to Cole, this operational error may alert some users.

Cole’s GitHub report advises users to check their X account settings to identify suspicious app connections. He specifically recommended revoking access for any app labelled “Calendar” to stop attackers from maintaining control.

The campaign’s success stems from its subtle execution, which combines metadata spoofing, Unicode homograph techniques, and OAuth abuse. These methods make detection difficult and increase the credibility of phishing attempts. Security experts note that it is crucial to be cautious when considering app permission requests, and suspicious access requests are one of the few indicators of compromise.

Also Read: Crypto Crime Trail: Bybit Hack Funds Surface in Greece Amid Global Crackdown

Join our WhatsApp Channel to get the latest news, exclusives and videos on WhatsApp

Dogecoin Latest News and ETF Updates: This Meme Coin is Expected to Beat What DOGE Did in 2021

Ethereum's $10 Billion Validator Queue Could Trigger Massive Influx Into This Hidden $0.01 ETH Token

Analysts Predict Ozak AI at $1 by 2026 as Presale Hype Surges Past $3.4M

Viral Ethereum L2 Meme Coin Set to Soar 21077% Leaving Dogecoin (DOGE) in the Dust in 2025

3 Reasons Shiba Inu Will Struggle to Hold Its Gains After the 2025 Bull Run as Little Pepe (LILPEPE) Aims for 16724% Climb