
X, formerly known as Twitter, is still one of the world’s most widely used social media platforms. As of February 2025, X had over 100 million users in the U.S. alone. Bloggers, writers, and cultural critics thrive on X, as do scammers.
Scammers have developed a wide range of tactics and tricks to target users from all backgrounds and regions. Even routine events, like service outages that prompt people to search “is Twitter down,” can be exploited by scammers sending fake alerts or phishing links.
If you want to be safe online in 2025, you need to know how these scams work and create practices to help you avoid becoming a piece of another scammer’s success story.
X scammers have several tried and successful maneuvers to steal from users. Review these tactics carefully to reduce your chance of falling for them:
1. Fake Support
Fake business accounts target users who complain about services. Scammers try to collect personal information.
Common tactic: A scammer pretends to be a customer support agent from an airline or other type of company. They request personal info in DMs
Typical targets: Users reporting service issues.
2. Crypto Scams
Scammers promote fake coins, airdrops, or investment opportunities to steal funds.
Typical targets: Cryptocurrency enthusiasts and users who repost cryptocurrency content.
3. Phishing Links
Users are tricked into clicking malicious links to steal credentials or cryptocurrency.
Common tactic: The scammer promises fake NFT drops or DeFi sites, hoping that the user will click on their link. Clicking on the link can lead users to a fake login page created to steal their credentials or download malware on their device.
Typical targets: Cryptocurrency holders.
4. Verification Phishing
Attackers send fake emails or messages claiming to verify accounts. Users are tricked into giving up their credentials.
Common tactic: Email sender impersonates X and sends fake verification notices. A user “verifies” their identity on a fake page, losing their login details to scammers.
5. Hacked Verified Accounts
Scammers hijack verified accounts to exploit their credibility and reach. Once compromised, accounts are used to post fraudulent content.
Common tactic: Hackers use social engineering techniques to gain access to high-profile accounts such as those of politicians, celebrities, or influencers. Once an account is compromised, an attacker uses it to scam its followers using other methods mentioned in this article.
Typical targets: Celebrities, politicians, influencers, and their followers.
6. Romance Scams
Attackers form fake relationships to gain trust and solicit money.
Common tactics: The scammer uses stolen or AI-generated images to create a profile on X. They then follow and message other users, trying to start a conversation with them. After a while, they start to gradually request payments.
Typical targets: Individuals interacting socially on X.
7. Malware and Fake Wallet Apps
Scammers use fraudulent software to steal private keys or redirect funds.
Common tactic: Hackers distribute links leading to fake download pages. If a user downloads the app, malware is installed. It can record keystrokes to grab users’ passwords or private keys or redirect transactions to different addresses.
Typical targets: Cryptocurrency users downloading wallet apps.
8. Fake Job Offers
Scammers pose as recruiters to collect wallet information or personal data.
Common tactic: After scammers contact the potential candidate, they eventually request wallet info or personal data. They can also send links “concerning the job” that may include malware.
Typical targets: Job seekers.
How to Prevent Getting Scammed on X
Scammers on X are constantly evolving, but there are tangible actions and behaviors you can take to fight back. How many of these do you already know or use? How many can you adopt today?
- Enable two-factor authentication (2FA). 2FA adds extra security to your account, so hackers and scammers need another verification to get access to your X account, even if your password is stolen.
- Use unique passwords. Avoid using the same password across your accounts. If one password is compromised or leaked, all your accounts, including X, can be in danger.
- Verify URLs before clicking. Never click unsolicited links. Before you click on any links on X, check for official domains or verify the app’s developer.
- Ignore suspicious DMs. Legit companies never initiate DMs asking for credentials. Real recruiters will never ask for your wallet information.
- Verify accounts. Check blue checkmarks and X handles carefully before you interact with the account. Don’t trust suspicious and unusual posts from celebrities or influencers, especially if they promote cryptocurrency or ask for donations in cryptocurrency.
- Report suspicious activity. If you notice something suspicious, report it to X. Reporting helps prevent others from falling victim.
Awareness is your first line of defense against scammers on social media. Staying informed and cautious ensures your accounts and assets remain secure, while reporting suspicious posts also helps to protect others in the X community from falling prey to these evolving scams.
Raghav is a talented content writer with a passion to create informative and interesting articles. With a degree in English Literature, Raghav possesses an inquisitive mind and a thirst for learning. Raghav is a fact enthusiast who loves to unearth fascinating facts from a wide range of subjects. He firmly believes that learning is a lifelong journey and he is constantly seeking opportunities to increase his knowledge and discover new facts. So make sure to check out Raghav’s work for a wonderful reading.