Smart Security Practices From The Best
What do Lido, Red Stone, YieldNest, and Braintrust have in common? They’ve developed effective methods for improving security without drastically increasing costs. Top-tier protocol […]
Learn how to effectively protect your X account. Do not let hackers take control.
Security is not only about smart contract audits. Security comes from a comprehensive approach because an attacker will always choose the easiest way to achieve their goal. It doesn’t matter if these are smart contracts containing vulnerabilities, an unaudited web application serving as an interface for users, a third party storing your keys, or an insider who will make an “accidental” mistake.
When the stakes are high enough, there will be someone willing to try their hand at it.
Account takeover may also be a way to do this.
A brief threat modeling session allows for determining who may want to attack the X account. What are key assets attackers aim to compromise, and how can they do it?
These are not the only things worth protecting. Additionally, for example, protecting information about who operates the social media account, makes it difficult for the attacker to determine their target. The less they know, the more space they have to search.
However, regarding account security, these are the key ones and usually allow the attacker to perform one of the following: logging into the account, taking over the session of the logged-in user, or recovering the account.
All these paths lead to abuse of built trust and expose users to loss of funds.
Sim swap is certainly not the only attack to worry about. There are many ways to hijack someone’s X account and the list below will certainly not be exhaustive. However, it might help to understand how hackers work and think.
There are even crazier methods, close to science fiction, such as determining a password based on the sound made by the keys used for typing. Of course, there are easier and more difficult ones to make. There are more likely ones and less likely ones. Nevertheless, even though some of the threat scenarios may probably seem unlikely, they happen.
It’s worth looking at the number of reports handled by the X security team through their bug bounty program:

Even recently, another bug related to bypassing access control was reported to the X security team by wh01s7. However, it turned out to be already reported.

It is possible to get a job in a company just to gather more information, and it is possible to take photos from a very long distance to read the card and personal details of an employee on a break. These are practices that have been operating in the criminal world for a long time.
When the entry barrier is low and the reward is high – it gets dangerous.
Fortunately, it is possible to mitigate threats and reduce the risk. The basic thing will be to enable 2FA and prevent the sim swap attack that has become so popular recently. This alone will significantly reduce the attacker’s possibilities.
There are many more things that can be done to enhance X account security. Most of them can be divided into those for individuals and those for organizations.
There are multiple threat scenarios that projects should be aware of to protect their organization’s security.
Let’s engage in a conversation about security. Share details about your current security strategies and measures. This will enable us to provide professional advice on potential enhancements and additional actions that could be beneficial for your security framework.
Composable Security 🇵🇱⛓️ is a small team with a holistic approach that goes beyond the code. A combination of expertize in Solidity smart contract security and experience gained through 6+ years securing global fintechs and Polish banks help comprehensively take care of DApp security. Learn more about us.
Creators of the Smart Contract Security Verification Standard and the first Security Guide for DApps CTOs, Lead Developers, and Security Enthusiasts.
Meet Composable Security
Get throughly tested by the creators of Smart Contract Security Verification Standard
Let us help
Get throughly tested by the creators of Smart Contract Security Verification Standard