Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Scammers Exploit Ukraine War & Japan Earthquake Fears to Spread Malware on X

    Scammers Exploit Ukraine War & Japan Earthquake Fears to Spread Malware on X

    August 12, 2024

    Scammers on the social media platform X (formerly known as Twitter) have escalated their tactics by exploiting global crises to deceive users into clicking on fake content.

    Recent reports reveal that these bad actors are leveraging the ongoing war in Ukraine and earthquake warnings in Japan to entice unsuspecting users into visiting fraudulent websites, which ultimately lead to adult sites, malicious browser extensions, and shady affiliate marketing pages.

    The Evolution of the Bot Problem on X

    X has long struggled with a bot problem, with spammers and scammers continuously finding new ways to exploit the platform. However, recent developments indicate that these schemes have become more sophisticated, now targeting users with content that appears to be relevant and urgent.

    For months, X has been inundated with posts that seemingly link to pornographic videos. However, upon clicking, users are redirected to fake adult sites—a classic bait-and-switch tactic. But the scammers have not stopped there.

    New Tactics: Exploiting the Ukraine War and Japanese Earthquake Warnings

    As tracked by Vigilant X users, including “Slava Bonkus” and “Cyber TM,” scammers have recently begun to diversify their bait, using sensational news stories to lure users. Posts have been circulating that purport to contain breaking news about Ukrainian forces invading the Russian city of Kursk or critical warnings about an impending earthquake in Japan’s Nankai Trough. These posts, designed to evoke a sense of urgency and fear, have successfully tricked many users into engaging with the content.

    For example, one fake tweet about the Nankai Trough earthquake reads: “Emergency information on the Nankai Trough mega-earthquake: What should we be careful of from now on? It’s all summarized in this article. Please read it carefully and plan your schedule.”

    The language used is designed to mimic the tone of genuine emergency communications, adding a layer of credibility to the scam.

    The Mechanics Behind the Scam

    Unlike the traditional bait-and-switch that redirects users to fake pornographic sites, these new posts feature what appear to be legitimate content warnings from X. However, these warnings are, in fact, just images embedded in the posts. When users click on these images, they are redirected to a URL at the app.link domain. From there, users are taken through a series of websites before landing on a scam site.

    The final destination of these redirects varies. While many users end up on adult sites, others may find themselves on sites that attempt to install malicious browser extensions or push tech support scams. Some sites are part of affiliate marketing scams designed to generate revenue for the scammers at the expense of the victims.

    How Scammers Avoid Detection on X

    One of the reasons these scams are so effective is the way they manipulate X’s content display system, specifically the use of Twitter Cards. Twitter Cards are a feature that allows users to attach rich media—such as photos, videos, and summaries—to their tweets, thereby enhancing the visual appeal and click-through rate of the content.

    When a post containing a URL is first created, X automatically reads the content at that URL to generate a preview, or “card,” that appears alongside the tweet. This preview includes an image, description, and other metadata that make the post appear legitimate.

    However, scammers have found a way to exploit this system. When the app.link site detects that the connection is coming from X, it does not redirect the user to the scam site. Instead, it serves up a harmless HTML page containing the necessary Twitter Card metadata. This trick fools X into displaying the fake content warning image as if it were a genuine part of the post. Once the post is live, and users click on the image, the redirect sequence begins, leading them to the scam site.

    The Impact and Response

    The use of global crises as bait in these scams is particularly insidious, as it preys on users’ fears and concerns. By presenting what appears to be urgent and relevant information, scammers increase the likelihood that users will click on the links, thus falling into their trap. The consequences can range from exposure to explicit content to the installation of harmful software on their devices.

    X has been working to combat these scams, but the ever-evolving tactics of scammers present a significant challenge. The platform relies on automated systems to detect and remove malicious content, but as scammers find new ways to evade detection, the effectiveness of these systems is put to the test.

    Staying Safe on X

    As users navigate X, it’s crucial to remain vigilant. Always double-check the legitimacy of content, especially when it appears to be linked to breaking news or emergency alerts. Avoid clicking on links from unfamiliar sources, and be cautious of posts that seem too sensational to be true. By staying informed and exercising caution, users can protect themselves from falling victim to these increasingly sophisticated scams.

    In the meantime, X will need to continue refining its detection and prevention mechanisms to stay ahead of the scammers who continue to find new ways to exploit the platform and its users.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleIndustrial Remote Access Tool Ewon Cosy+ Vulnerable to Root Access Attacks
    Next Article Sinkclose Vulnerability in AMD Chips: What You Need to Know About Unpatched Models

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 17, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-40906 – MongoDB BSON Serialization BSON::XS Multiple Vulnerabilities

    May 17, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    How to get Code coverage via external rest assured API automation using jacoco?

    Development

    Bringing Silent Videos to Life: The Promise of Google DeepMind’s Video-to-Audio (V2A) Technology

    Development

    UAT-5918 Targets Taiwan’s Critical Infrastructure Using Web Shells and Open-Source Tools

    Development

    Language Models Know More Than They Show: Exploring Hallucinations From the Model’s Viewpoint

    Machine Learning
    GetResponse

    Highlights

    Artificial Intelligence

    How to Unlock Your Destiny Using Your Mind’s Eye?

    June 14, 2024

    Start Your Own ChatGPT Office with AI Agents: Revolutionize Your Business with Intelligent Virtual Assistants…

    CelloType: A Transformer-Based AI Framework for Multitask Cell Segmentation and Classification in Spatial Omics

    November 27, 2024

    Salesforce Apex Tokenization: Enhancing Data Security

    January 29, 2025

    DarkGate Malware Replaces AutoIt with AutoHotkey in Latest Cyber Attacks

    June 4, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.