Fraudsters abuse Twitter APIs to monitor public tweets and pish cryptocurrency scams

This article has been indexed from

IT Security Guru

Fraudsters use bots to monitor Tweets requesting support to MetaMask, TrustWallet, and other crypto wallets to respond with scams within seconds, BleepingComputer reports. To launch these targeted attacks, scammers monitor all public Tweets fro specific keywords and phrases, such as “support”, “assistance” and “help”, paired with “MetaMask”, “Phantom”, “Yoro” and “TrustWallet”. Twitter bots are used […]

The post Fraudsters abuse Twitter APIs to monitor public tweets and pish cryptocurrency scams appeared first on IT Security Guru.

Read the original article: