Close Menu
    Facebook X (Twitter) Instagram Pinterest YouTube LinkedIn TikTok
    TopBuzzMagazine.com
    Facebook X (Twitter) Instagram Pinterest YouTube LinkedIn TikTok
    • Home
    • Movies
    • Television
    • Music
    • Fashion
    • Books
    • Science
    • Technology
    • Cover Story
    • Contact
      • About
      • Amazon Disclaimer
      • Terms and Conditions
      • Privacy Policy
      • DMCA / Copyrights Disclaimer
    TopBuzzMagazine.com
    Home»Technology»My X Account Was Hijacked to Sell a Fake WIRED Memecoin. Then Came the Backlash
    Technology

    My X Account Was Hijacked to Sell a Fake WIRED Memecoin. Then Came the Backlash

    By AdminMay 12, 2025
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    My X Account Was Hijacked to Sell a Fake WIRED Memecoin. Then Came the Backlash


    In theory, the more prominent the X account, the greater the potential return on the pump-and-dump, because many more people are likely to buy into the coin the scammer promotes. I tweet infrequently—mostly links to my articles—and have fewer than 2,800 followers, making me somewhat of an unlikely target. But I was valuable to the scammer for the likelihood that I am considered a trusted authority in my capacity as a crypto reporter.

    “The greater exposure during the pump, the more likely it is that multiple inventors will buy into the messaging and buy into the eventual dump of the coin,” says John Powers, president at private investigation agency Hudson Intelligence.

    X did not respond to a request for comment.

    Though crypto coins have been used in pump-and-dump schemes for years, these maneuvers have become easier to execute with the arrival of memecoin launchpads, which allow anybody to create a coin instantly, at no cost. In my case, the scammer minted the WIRED-branded coin using Pump.Fun, by far the largest launchpad platform.

    “A lot of coins are used for pump-and-dumps on Pump.Fun. And when [bad actors] combine a pump-and-dump with the hack of an X account, it’s potentially lucrative for them if executed correctly,” says Larratt.

    “We continue to invest in making the platform safe for users,” said Pump.Fun spokesperson Troy Gravitt in a statement to WIRED. “When we find allegations of fraud, such as hacked X accounts shilling token scams, we’re able to delist those tokens from our front end to mitigate any threat they might pose to unsuspecting users.”

    Despite the prevalence of memecoin rug pulls, investors continue to pile into coins. “A lot of the appreciation of value in memecoins occurs very early in the process, soon after launch,” says Powers. “There’s this chance you might get in at the right moment and make a killing … Timing is everything. The legitimacy of the offering is a secondary concern to many people it seems.”

    I realized that my X account had been taken over on February 17, the day before the fraudulent WIRED coin was released. Have I Been Pwned, a service that lets people check whether their information has been exposed in data breaches and hacks, indicates that my X credentials had previously been distributed on a hacking forum, providing one possible explanation for my account having been compromised. Fatally, I had not put in place two-factor authentication, which meant that my password was all somebody needed to seize control of the account.

    Because the scammer had swapped out my recovery email, I had to go through a longer, more arduous recovery process with X, which meant that I did not immediately regain my account. By the following morning, it was already too late. An analysis of transaction data shows that the person or group who hacked my X account created the WIRED token at 1:20 am UTC that morning.

    When somebody creates a coin on Pump.Fun, they release one billion units into circulation and typically purchase some themselves at a nominal rate. In this case, the scammer snapped up around 5 percent of the total supply with the same crypto wallet used to issue the coin, then acquired more using two separate wallets immediately after trading began, according to analysis by Powers and Chainalysis. They used these secondary wallets to conceal the extent of their holdings from the investing public. “You can buy a certain amount of your own token. But if you buy a lot, nobody is going to buy in because it’s very suspicious,” says Larratt.

    View Original Source Here

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    At Least 750 US Hospitals Faced Disruptions During Last Year’s CrowdStrike Outage, Study Finds

    July 19, 2025

    Sources: at least six of China's biggest VC firms are targeting a combined $2B in new USD-denominated funds to allow overseas investment in Chinese startups (Bloomberg)

    July 19, 2025

    Adobe Upgrades Firefly Video Model With New Tools and Improved Motion Generation

    July 18, 2025

    ICE Is Getting Unprecedented Access to Medicaid Data

    July 18, 2025

    OpenAI debuts ChatGPT Agent, which can control an entire computer and perform multi-step tasks, powered by a new dedicated model, rolling out to paid users (Hayden Field/The Verge)

    July 17, 2025

    iPhone Models With China-Made Displays Reportedly Face Ban in the US; Apple Says ‘No Effect’ on Products

    July 17, 2025
    popular posts

    How the Catsuit Clawed Its Way to the Top

    Romance Across Genres: 6 Romance Books to Steal Your Heart

    Miley Cyrus has no “desire” to tour again: “It’s so isolating”

    The Undercurrent by Sarah Sawyer

    Bestseller Jennifer Probst Shares Her Favorite Romance Reads

    Ed Sheeran Talks ‘Thinking Out Loud’ Copyright Trial: ‘I Had

    The war in Gaza is creating a health crisis that

    Categories
    • Books (3,297)
    • Cover Story (5)
    • Events (19)
    • Fashion (2,457)
    • Interviews (43)
    • Movies (2,596)
    • Music (2,875)
    • News (155)
    • Politics (2)
    • Science (4,446)
    • Technology (2,589)
    • Television (3,319)
    • Uncategorized (932)
    Archives
    Facebook X (Twitter) Instagram Pinterest YouTube Reddit TikTok
    © 2025 Top Buzz Magazine. All rights reserved. All articles, images, product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Terms of Use and Privacy Policy.

    Type above and press Enter to search. Press Esc to cancel.

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
    Do not sell my personal information.
    Cookie SettingsAccept
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
    CookieDurationDescription
    cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
    cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
    cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
    cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
    cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
    viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
    Functional
    Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
    Performance
    Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
    Analytics
    Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
    Advertisement
    Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
    Others
    Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
    SAVE & ACCEPT