Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

shanghaishanghai
0

X Account Security Check and Strengthening Guide: SlowMist Offers Tips to Protect Your Account

Recent Rise in X Account Hacks Raises Concerns

In recent months,there has been a surge in incidents where X accounts belonging to Web3 project teams and prominent figures have been compromised, leading to the dissemination of phishing messages. Hackers are employing various tactics to steal user accounts, including:

  • Deceptive Calendly/Kakao Meeting Links: Users are lured into clicking fake meetinglinks, granting unauthorized access to their accounts or potentially allowing hackers to control their devices.
  • Malicious Software Disguised as Games or Meetings: Private messages trick users into downloading software containing malware. These programs steal private keys,seed phrases, and potentially X account credentials.
  • SIM Swap Attacks: Hackers exploit mobile phone vulnerabilities to gain control of X accounts linked to phone numbers.

SlowMist Steps in to Help

SlowMist, a leadingblockchain security company, has been instrumental in resolving several such incidents. For instance, on July 20th, the X account of TinTinLand, a Web3 project, was compromised, and the attacker posted a phishing link. SlowMist’s intervention helped TinTinLand regain control of their account and implement securitymeasures.

Recognizing the growing vulnerability of X users, SlowMist has released a comprehensive guide outlining steps to check and strengthen account security.

SlowMist’s X Account Security Check and Strengthening Guide

Authorization Check

  1. Review Authorized Applications: Many phishing attacks exploit users’ unintentional clickson links that grant unauthorized app access. To prevent this:

    • Go to Settings and privacy on the X website.
    • Select Security and account access.
    • Choose Apps and sessions to see the apps connected to your account.
    • Review each app’s permissionsand revoke access using Revoke app permissions if necessary.
  2. Check Delegations:

    • Navigate to Settings -\u003e Security and account access -\u003e Delegate.
    • If you have enabled account sharing, review the Members you’ve delegated list.
      *Remove delegations for accounts you no longer need to share access with.
  3. Analyze Login Logs:

    • To identify suspicious login attempts, examine your login history:
    • Go to Settings -\u003e Security and account access -\u003e Apps and sessions -\u003e Account access history.
  • Review the login device, date, IP address, and location.
    • If you find unusual entries, it could indicate account compromise.
  1. Log Out Suspicious Devices:
    • If you suspect malicious logins, log out from compromised devices:
    • Select Log out the deviceshown to remove access from specific devices.

Security Settings

  1. Enable Two-Factor Authentication (2FA):

    • Go to Settings -\u003e Security and account access -\u003e Security -\u003e Two-factor authentication.
    • Configure 2FA using methodslike SMS codes, authenticator apps, or security keys for enhanced account protection.
  2. Additional Password Protection:

    • For an extra layer of security, enable additional password protection:
    • Go to Settings -\u003e Security and account access -\u003e Security -\u003e Additional password protection.

SlowMist’s Recommendations

  • Regularly check authorized applications and login activity to ensure account security.
  • Implement SlowMist’s recommended security measures to strengthen your X account.
  • If you suspect account compromise, take immediate action:
    • Change your password.
    • Conduct an authorization check.
    • Revoke suspicious authorizations.
    • Implement additional security settings.

Stay Informed and Stay Safe

SlowMist’s guide provides valuable insights into safeguarding X accounts. By following these steps, users can significantly reduce the risk of falling victim to phishing attacks and other security threats. Staying informedand taking proactive measures is crucial in the ever-evolving digital landscape.


>>> Read more <<<

Views: 0

0

发表回复

您的邮箱地址不会被公开。 必填项已用 * 标注