From: thepipeline_xyz

Mimicking online identities is a sophisticated tactic used by attackers to compromise individuals, often involving significant effort and resources [00:00:58]. This method typically falls under the umbrella of social engineering campaigns [00:00:53].

Case Study: The Y22 Incident

A notable trader named Y22 gained significant traction by publicly sharing his trading journal on Twitter [00:00:04]. An attacker exploited Y22’s popularity by posting a link to a fraudulent Telegram group within his Twitter thread [00:00:08].

Deception Tactics

The attacker meticulously mimicked Y22’s online persona to enhance credibility [00:00:34]:

The Compromise Method

Upon entering the deceptive Telegram group, users were prompted to verify themselves, which involved additional steps [00:00:11]. This process required users to switch from their phone to their desktop browser to perform a specific action [00:00:20]. This action, performed on the desktop browser where hot wallets are typically accessed, led to Y22’s compromise and the loss of nearly all his assets [00:00:27].

Attacker Motivation and Effort

Individuals engaged in such social engineering campaigns are willing to go to extreme lengths, including shelling out “five figures” in financial investment, as well as significant time and effort, to compromise targets [00:00:47]. This level of investment indicates the potential returns attackers anticipate from such activities [00:01:00].