Live
Black Hat USADark ReadingBlack Hat AsiaAI BusinessGeopolitics, AI, and Cybersecurity: Insights From RSAC 2026Dark ReadingAdvanced Compact Patterns for Web3 DevelopersDEV CommunityA conversation on concentration of powerLessWrongDecoding the Black Box: LLM Observability with LangSmith & Helicone for Local ModelsDEV CommunityBest Free Snyk Alternatives for Vulnerability ScanningDEV CommunityKey AI, Cybersecurity, and Privacy Takeaways from the NAIC 2026 Spring Meeting - JD SupraGoogle News: AIAI LEGAL KEYNOTE SPEAKER & ARTIFICIAL INTELLIGENCE LAW FUTURIST FOR EVENTS - futuristsspeakers.comGNews AI legalOpenAI Buys Streaming Show ‘TBPN,’ Aiming to Change Narrative on A.I. - The New York TimesGoogle News: AIGateway Capital announces first close of $25M Fund IITechCrunch AIBrazil’s machinery industry drives innovation in automation, AI, IoT and clean energy - The National Law ReviewGNews AI BrazilHow Cos. Can Navigate The Patchwork Of AI Safety Bills - Law360Google News: AI SafetyFailed AI tractor company lays off all employees, abandons Bay Area headquartersHacker News AI TopBlack Hat USADark ReadingBlack Hat AsiaAI BusinessGeopolitics, AI, and Cybersecurity: Insights From RSAC 2026Dark ReadingAdvanced Compact Patterns for Web3 DevelopersDEV CommunityA conversation on concentration of powerLessWrongDecoding the Black Box: LLM Observability with LangSmith & Helicone for Local ModelsDEV CommunityBest Free Snyk Alternatives for Vulnerability ScanningDEV CommunityKey AI, Cybersecurity, and Privacy Takeaways from the NAIC 2026 Spring Meeting - JD SupraGoogle News: AIAI LEGAL KEYNOTE SPEAKER & ARTIFICIAL INTELLIGENCE LAW FUTURIST FOR EVENTS - futuristsspeakers.comGNews AI legalOpenAI Buys Streaming Show ‘TBPN,’ Aiming to Change Narrative on A.I. - The New York TimesGoogle News: AIGateway Capital announces first close of $25M Fund IITechCrunch AIBrazil’s machinery industry drives innovation in automation, AI, IoT and clean energy - The National Law ReviewGNews AI BrazilHow Cos. Can Navigate The Patchwork Of AI Safety Bills - Law360Google News: AI SafetyFailed AI tractor company lays off all employees, abandons Bay Area headquartersHacker News AI Top
AI NEWS HUBbyEIGENVECTOREigenvector

Elon Musk's X to deploy scam kill switch by auto-locking first-time crypto mentioners

CoinDesk AIby Francisco RodriguesApril 2, 20261 min read0 views
Source Quiz

The move comes in response to a wave of phishing attacks using fake copyright emails and is the latest in an attempt to shut down crypto-linked scams on the platform.

The move comes in response to a wave of phishing attacks using fake copyright emails and is the latest in an attempt to shut down crypto-linked scams on the platform.

Apr 2, 2026, 3:28 p.m.

Make preferred on

Social media platform X is preparing a new security measure aimed at shutting down a widespread form of crypto phishing that leverages hijacked accounts to promote scam tokens.

The company will soon auto-lock any account that mentions cryptocurrency for the first time in its history, according to the company’s Head of Product Nikita Bier. Users will need to go through additional verification before being allowed to post again.

Bier said the feature targets the core incentive behind these attacks. “This should kill 99% of the incentive,” he wrote, referring to the current wave of phishing that tricks users into giving up their credentials, then uses their accounts to push crypto scams.

The change was unveiled in response to a detailed firsthand account from an X user who lost control of their account after falling for a phishing email disguised as a copyright violation notice.

The attacker, the user said, used a pixel-perfect fake login page to harvest two-factor codes, then locked the user out and began promoting fraudulent crypto projects from their account.

Crypto scams on X

These types of attacks have been extremely common on X, an inheritance from before it was acquired by Elon Musk and was still called Twitter.

One of the most common tactics is the "double your money" scam, in which users are told to send cryptocurrency in exchange for a promise of more. Others push fake memecoins or fraudulent airdrops, often using hijacked accounts to lend credibility.

Impersonation is one of the most powerful tools. Spoofed accounts impersonating major personalities have repeatedly tricked followers into clicking malicious links that mimic legitimate crypto platforms.

Cryptocurrency transactions are irreversible, so once a user falls for such an attack, their funds are gone.

The most infamous example came in 2020, when hackers accessed Twitter’s internal systems and took control of major accounts, including those of Apple, Barack Obama, and Elon Musk.

They used those accounts to promote a fake bitcoin giveaway, netting over $100,000 before the posts were removed. That breach, carried out through social engineering against Twitter employees, resulted in the hacker receiving a 5-year sentence.

X has made several attempts to bolster security. These have included bot purges, API restrictions, and behavioral detection. The latest move to auto-lock accounts that post about crypto for the first time builds on those efforts, aiming to cut off the tactic at its root: by making hijacked accounts useless for scams.

Bier also called out Google for failing to stop phishing emails at the email level, pointing the finger at the tech giant’s share of the responsibility for failing to protect its users from phishing attacks.

More For You

Most crypto privacy models weaken as blockchain data grows. Encryption-based models like Zcash strengthen. CoinDesk Research maps the five privacy approaches and examines the widening gap.

Why it matters:

As blockchain adoption scales, the metadata available to machine learning models scales with it. Obfuscation-based privacy approaches are structurally degrading as a result. This report provides a comprehensive comparison of all five major crypto privacy architectures and a framework for evaluating which models remain durable as AI capabilities improve.

View Full Report

More For You

The conflict centered on a proposal to fund product development and expansion, which ACI opposed due to concerns over self-voting and lack of transparency.

What to know:

  • The Aave Chan Initiative (ACI) is shutting down due to a dispute with Aave Labs over transparency and voting power related to a record budget request.
  • The conflict centered on a proposal to fund product development and expansion, which ACI opposed due to concerns over self-voting and lack of transparency.

Read full story

Was this article helpful?

Sign in to highlight and annotate this article

AI
Ask AI about this article
Powered by Eigenvector · full article context loaded
Ready

Conversation starters

Ask anything about this article…

Daily AI Digest

Get the top 5 AI stories delivered to your inbox every morning.

Knowledge Map

Knowledge Map
TopicsEntitiesSource
Elon Musk's…platformCoinDesk AI

Connected Articles — Knowledge Graph

This article is connected to other articles through shared AI topics and tags.

Knowledge Graph100 articles · 183 connections
Scroll to zoom · drag to pan · click to open

Discussion

Sign in to join the discussion

No comments yet — be the first to share your thoughts!

More in Products