CloudSEK Logo
January 3, 2024

Gold Rush on the Dark Web: Threat Actors Target X (Twitter) Gold Accounts

The whitepaper "Gold Rush on the Dark Web: Threat Actors Target X (Twitter) Gold Accounts" by Rishika Desai discusses the surge in dark web activities surrounding Twitter's new 'Gold' verification. It reveals how threat actors sell Twitter Gold accounts, which were introduced alongside 'Blue' and 'Grey' verifications. The paper outlines various methods used to acquire these accounts, including manual creation, brute-forcing existing accounts, and using malware to harvest credentials. It highlights the risks posed by these activities, including phishing and disinformation campaigns. The paper emphasizes the need for robust cybersecurity practices to protect against these threats.

Authors & Contributors

Rishika Desai
Cyber Threat Researcher @ CloudSEK
Downloadable Report

Download the Report

Download the report by clicking below.
The Download will start immediately.

Join our newsletter

Sign up so that you don't miss any updates from us

Gold Rush on the Dark Web: Threat Actors Target X (Twitter) Gold Accounts

Explore the alarming rise of Twitter Gold account sales on the dark web in "Gold Rush on the Dark Web: Threat Actors Target X (Twitter) Gold Accounts." Uncover the tactics used by cybercriminals to exploit Twitter's verification system and the associated cyber threats. Learn vital cybersecurity measures to safeguard against these risks.

The whitepaper "Gold Rush on the Dark Web: Threat Actors Target X (Twitter) Gold Accounts" by Rishika Desai discusses the surge in dark web activities surrounding Twitter's new 'Gold' verification. It reveals how threat actors sell Twitter Gold accounts, which were introduced alongside 'Blue' and 'Grey' verifications. The paper outlines various methods used to acquire these accounts, including manual creation, brute-forcing existing accounts, and using malware to harvest credentials. It highlights the risks posed by these activities, including phishing and disinformation campaigns. The paper emphasizes the need for robust cybersecurity practices to protect against these threats.