Gate News reports that on March 18, X (Twitter) launched a “Dislike” button to optimize reply content ranking. At the same time, a large number of phishing emails impersonating the platform flooded in, posing new security risks for users. According to security analyst Marty Party, attackers are forging “content violation” notification emails to trick users into clicking the “Appeal Violation” button, thereby stealing passwords and personal data. The emails use deceptive domains like communitycase-x.com, making it difficult for victims to distinguish genuine from fake.
Nikita Bier, product lead at X, stated, “The ‘Dislike’ button only appears in replies and is used to privately record the number of low-quality responses. The algorithm then boosts the ranking of high-quality replies and reduces the visibility of spam.” This feature is not yet available to all users, especially in regions like East Africa, where some users may not have immediate access. Additionally, the longstanding issue of spam in private messages has not been fully resolved.
On-chain analysis shows that the amount of spam on Twitter has increased during the recent feature adjustments, with scammers exploiting users’ unfamiliarity with the new functions. cybersecurity experts warn users to verify email sources carefully and avoid clicking suspicious links or sharing sensitive information.
Overall, the platform’s long-term strategy aims to curb the economic incentives behind spam. However, during the transition period, users should remain vigilant to prevent personal accounts and data from being compromised. As the platform’s algorithms are optimized and features gradually rolled out, the visibility of high-quality content is expected to improve, while malicious information dissemination will be restricted.
Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to
Disclaimer.
Related Articles
Kelp DAO Hack Attributed to Lazarus Group; eth.limo Domain Hijacked via Social Engineering
LayerZero reported that the Kelp DAO exploit, attributed to North Korea's Lazarus Group, led to a loss of $292 million in rsETH tokens due to vulnerabilities in its decentralized verifier network. Additionally, eth.limo faced a domain hijacking from a social engineering attack, but DNSSEC mitigated severe damage.
GateNews1h ago
DeFi Hack Triggers $9 Billion in Outflows from Aave as Stolen Tokens Used as Collateral
A recent hack draining nearly $300 million from a crypto project led to a liquidity crisis on Aave, causing users to withdraw around $9 billion. Concerns over collateral quality prompted mass withdrawals, highlighting risks in DeFi lending.
GateNews2h ago
Ethereum Phishing Attack Drains $585K From Four Users, Single Victim Loses $221K WBTC
A coordinated Ethereum phishing attack drained $585,000 from four victims, exploiting user permissions through a deceptive link. This incident highlights the rapid loss of funds via social engineering, even under the guise of legitimacy.
GateNews4h ago
Pay attention to the signed content! Vercel is hit with ransomware demanding $2 million, and crypto protocol frontend security raises a red flag
The cloud development platform Vercel was breached by hackers on April 19. The attackers gained access through a third-party AI tool used by employees and threatened to extort $2 million. Although sensitive data was not accessed, other data may have been used. The incident has raised security concerns in the crypto community, and Vercel is currently investigating while advising users to rotate their keys.
ChainNewsAbmedia5h ago
KelpDAO Loses $290M in Lazarus Group LayerZero Attack
KelpDAO faced a $290 million loss due to a sophisticated security breach linked to the Lazarus Group. The attack exploited configuration weaknesses in their verification system and highlighted the risks of relying on a single-point verification setup. Industry experts emphasize the need for improved security configurations and multi-layer verification to prevent future incidents.
CryptoFrontier6h ago
LayerZero responds to Kelp DAO’s 292 million incident: it indicates that Kelp set up a custom 1-of-1 DVN configuration, and the attacker was North Korea’s Lazarus.
LayerZero issued a statement regarding the $292 million hack suffered by Kelp DAO, accusing Kelp’s self-selected 1-of-1 DVN configuration of making the incident possible. The attacker was the North Korean Lazarus Group. LayerZero emphasized that this incident stems from configuration choices and that it will no longer support this kind of vulnerable setup. In addition, responsibility is still disputed, and no compensation plan has been provided.
ChainNewsAbmedia6h ago