Monday, May 19, 2025
HomeCyber AttackNew Attack Exploits X/Twitter Ad URL Feature to Deceive Users

New Attack Exploits X/Twitter Ad URL Feature to Deceive Users

Published on

SIEM as a Service

Follow Us on Google News

Silent Push Threat Analysts have recently exposed a sophisticated financial scam leveraging a vulnerability in X/Twitter’s advertising display URL feature to deceive users.

This attack manipulates the platform’s URL display mechanism to present a legitimate-looking link, such as “From CNN[.]com,” while redirecting unsuspecting victims to a malicious cryptocurrency scam site impersonating Apple’s brand.

This campaign, centered around a fictitious “Apple iToken,” represents a new level of deception in social media advertising fraud, exploiting technical loopholes to trick users into engaging with harmful content.

- Advertisement - Google News
X/Twitter
Screenshot of the Order ID error message

Spoofed URLs in X/Twitter Ads

The core of this attack lies in an exploit of X/Twitter’s URL handling and metadata retrieval process.

When a URL is posted on the platform, X/Twitter’s bot fetches metadata using a consistent User Agent (UA) string to generate a preview card.

Malicious actors exploit this by configuring their servers to redirect the bot to a benign site like cnn[.]com, while real users are rerouted to a fraudulent domain such as ipresale[.]world.

Alternatively, attackers use URL shorteners like bit[.]ly to initially point to a legitimate site for metadata collection, later updating the redirect to a malicious destination.

This results in a preview card that displays a trusted domain, masking the true, harmful landing page.

After the redirect chain-often involving intermediate links like t[.]co/OswjDCIcFI-victims land on scam sites promoting a fake cryptocurrency presale.

These sites, complete with forged endorsements from Apple CEO Tim Cook, lure users into creating accounts and transferring funds to one of 22 provided crypto wallets across various blockchain networks, including Bitcoin, Ethereum, and Solana.

X/Twitter
Screenshot of X/Twitter ad abusing the Apple brand

Silent Push Uncovers Crypto Scam Network

Further investigation by Silent Push revealed a sprawling network of nearly 90 related domains, active since 2024, likely operated by the same threat actor group.

The campaign expanded with a second X/Twitter ad on May 5, 2025, redirecting through chopinkos[.]digital to itokensale[.]live, displaying nearly identical scam content.

Using advanced tools like Silent Push’s Web Resource Scan, analysts identified reused files, favicons, and infrastructure fingerprints-such as specific IP addresses (e.g., 51.15.17[.]214) and name servers (ns1.chsw.host)-linking these domains to a broader ecosystem of financial fraud.

Many sites also abuse Apple trademarks or impersonate other brands, with some tied to suspicious .ru domains, though direct attribution remains uncertain.

This sophisticated operation underscores the evolving tactics of cybercriminals in exploiting social media platforms for financial gain, highlighting the urgent need for enhanced URL validation mechanisms and user awareness.

Below is a curated list of Indicators of Compromise (IOCs) associated with this campaign, provided by Silent Push to aid in threat detection and mitigation:

TypeIndicatorDescription
IP Address51.15.17[.]214Dedicated IP used by scam domains
Domainipresale[.]worldPrimary scam landing page
Domainitokensale[.]liveSecondary scam landing page
Domainchopinkos[.]digitalRedirect domain in recent campaign
NameServerns1.chsw.hostSuspicious name server used by many scam sites

Setting Up SOC Team? – Download Free Ultimate SIEM Pricing Guide (PDF) For Your SOC Team -> Free Download

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

New Report Finds 67% of Organizations Experienced Cyber Attacks in the Last Year

A disturbing 67% of businesses in eight worldwide markets—the US, UK, Spain, the Netherlands,...

Auth0-PHP Vulnerability Enables Unauthorized Access for Attackers

Critical security vulnerability has been discovered in the Auth0-PHP SDK that could potentially allow...

Active Exploitation of Ivanti EPMM Zero-Day Vulnerability in the Wild

Security researchers at The Shadowserver Foundation have identified active exploitation attempts targeting a critical...

Hacker Arrested for Taking Over SEC Social Media to Spread False Bitcoin News

Alabama man has been sentenced to 14 months in prison for orchestrating a sophisticated...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

New Report Finds 67% of Organizations Experienced Cyber Attacks in the Last Year

A disturbing 67% of businesses in eight worldwide markets—the US, UK, Spain, the Netherlands,...

Auth0-PHP Vulnerability Enables Unauthorized Access for Attackers

Critical security vulnerability has been discovered in the Auth0-PHP SDK that could potentially allow...

Active Exploitation of Ivanti EPMM Zero-Day Vulnerability in the Wild

Security researchers at The Shadowserver Foundation have identified active exploitation attempts targeting a critical...