Verification scams hitting Elon Musk’s X after changing former Twitter checkmarks

X — formerly known as Twitter – has gone through more than a name change since it switched over. One of these has been with the account verification process — you know, that little blue checkmark that certain profiles have that indicates it’s verified. Without that blue checkmark, it can be difficult to contact other people on X, get through certain groups, and essentially, use the platform to the fullest.

Credit: X

 

How does one get a verified, blue checkmark on X?

Before Elon Musk took over Twitter, there was only one way to get the blue checkmark — or Twitter Blue — on Twitter. To do so, you had to be a well-known figure like a celebrity, politician, journalist, or part of an organization. Generally, Twitter would reach out to the person directly to confirm their identity.

Now, that’s all changed. These days, just about anyone can get a blue checkmark via X’s subscription-based model if they’re willing to pay a monthly subscription fee. (And, paying more can also get you a gold checkmark, which is usually reserved for businesses.)

This fee not only gets you verified but also gives you the ability to do things on X that those without it can’t, like editing tweets, exposure to fewer ads, and possibly more visibility for your tweet. Some accounts have even enabled a setting to only be able to receive messages from verified accounts.

Credit: X

 

MORE: TIPS TO FOLLOW FROM ONE INCREDIBLY COSTLY CONVERSATION WITH CYBERCROOKS

 

How scammers are taking advantage of X’s verification-change chaos

Unfortunately, there is a downside to everyone being able to get that blue checkmark. Not only do you now have to be concerned with getting yourself verified so that you can direct message others who have that setting enabled, but you also have to be on the lookout for scammers who are using the blue checkmark to trick you. Here are 3 scams to look out for:

 

1) Blue-tick scammers

A blue-tick scammer is a person who pays to get the blue-tick checkmark verification on X and then uses that to scam people. But, who do they scam, and how? Blue-tick scammers have a very particular method and usually target users who complain about poor customer service on X. Maybe they are even complaining specifically about the issues getting their verification on X.

Ultimately, the goal of these scammers is to trick you into disclosing your bank details by promising refunds to you. In June of last year, for example, passengers whose easyJet flights had been canceled were targeted by cybercriminals on X in this exact way.  These scammers were using fake profiles to target victims who had resorted to X to voice their complaints against the airline and demand a refund, only to potentially lose more money by being scammed.

 

2) Elon Musk impersonators

It’s not uncommon to encounter fake accounts pretending to be well-known personalities — even Elon Musk. These accounts might lack official verification, but at first glance, they won’t give unsuspecting users a reason to doubt the profile is who it appears to be. These Elon Musk impersonators will try just about anything, but a popular scam is in the form of cryptocurrency ads.

Here’s how the scam goes down. An ad appears on X, which appears to be coming from one of Elon Musk’s companies — or a blue-tick verified Elon Musk profile — advertising a new cryptocurrency that he’s created and steps for people to get it, ultimately encouraging you to transfer money over to the scammer’s wallet.

Credit: X

MORE: PROTECT YOUR BACON: THE RISE OF PIG BUTCHERING SCAMS AND HOW TO AVOID THEM

 

3) Bots posing as scantily clad women

Not everyone will fall for this one, but it’s a scam as old as time that’s adapted to new rules on social media environments. If you get any direct messages from verified X accounts posing as a scantily clad woman, it could be a legitimate user. But, it could also be a scammer or even a “sexbot,” which has increased in numbers since all the changes at X as well as the introduction of AI.

 

I don’t use X. Why should I be concerned?

The changes on X highlight wider issues in online verification and the potential for misuse. Even if you don’t use X, scammers may attempt similar tactics on other platforms you frequent. Being aware of these scams and how they work can help you stay safe online.

 

Credit: X

 

How to stay safe from blue checkmark scammers

The good news is that X is aware of these scams. Now, X’s non-deceptive Twitter eligibility requirements for buying a Premium subscription require the user to not have recently changed their photo, display name, or username. One of the best ways to protect yourself from scams on popular social media platforms like X is to simply be aware of what new scams are out there. By staying up-to-date, you can know your weapon to ward off these scammers.

That being said, there are 10 steps you can take to ensure your safety on X.

1) Protect your personal information: Do not share your full name, address, phone number, email, passwords, or other sensitive information with strangers or people you do not trust on X.

2) Be skeptical: If an X account seems fishy, investigate further. Check join dates, usernames, and their activity history.

3) Use a unique and strong password for your account and change it regularly: Consider using a password manager to securely store and generate complex passwords. It will help you to create unique and difficult-to-crack passwords that a hacker could never guess.

4) Enable two-factor authentication: Two. 2FA requires you to enter a code that is sent to your phone or email or generated by an app in addition to your password when you log in. This way, even if someone knows your password, they cannot access your account without the code.

5) Review your privacy settings: Limit who can see your posts, photos, and profile information on X by changing your privacy settings.

6) Verify the source and accuracy of information: Do not believe everything you see or read on social media. Always check the source and credibility of the information before you engage with the content and share it with others. Use reliable and reputable sources to verify the source and the facts.

7) Have good antivirus software on all your devices:

Special for CyberGuy Readers: 

Best Antivirus Protection 2024

 

8) Delete anyone who tries to trick you: If anyone tries to scam you or you encounter any suspicious accounts, consider reporting them to X immediately. You can use X’s reporting features to flag potential scams. This will also help others from being scammed.

9) Stay informed about security updates: Keep your software and apps updated to protect yourself from the latest threats.

10) Prevent strangers from following you, via X’s privacy settings: This can be a good way to prevent some of those bots or scammers from getting to you.

All you need to do is click on Settings, select Privacy and Safety, move the toggle for Protect Your Tweets, and select Done. Now, only people whose accounts you approve have permission to follow you. You can also block and remove followers if the former is too strict for you.

 

MORE: HOW TO PROTECT YOURSELF FROM SOCIAL MEDIA SCAMMERS

 

Kurt’s key takeaways

Social media can be like the Wild West, especially when a bunch of new changes are happening every day. In terms of cybersecurity and protecting yourself online, it’s important to be aware of scams like this. Just because something has a blue checkmark (or, anything else that would make it seem “verified” in a certain context) does not mean that it is. It’s so easy for scammers to pose as someone or something else, and chances are, they’ll keep coming along. So, it’s okay to second-guess something if you’re not 100% sure, and online, we never really can be.

What are your biggest concerns about the potential for scams on the social media platforms you frequently visit? Let us know in the comments below. Let us know in the comments below.

FOR MORE OF MY SECURITY ALERTS, SUBSCRIBE TO MY FREE CYBERGUY REPORT NEWSLETTER HERE

 

 

 

Copyright 2024 CyberGuy.com.  All rights reserved.  CyberGuy.com articles and content may contain affiliate links that earn a commission when purchases are made.

Related posts

Updated Android malware can hijack calls you make to your bank

Top 10 robocall hotspots in America

In just two hours this tiny smart home can be set up nearly anyplace