When a verified X account is compromised, the recovery process can be a complex and time-consuming endeavor. Here's a breakdown of what happens and why it's crucial to act swiftly.
The Hacking Scenario:
Verified accounts on X are prime targets for hackers due to their public visibility and influence. Once a verified account is hacked, attackers gain full control, often posting unauthorized content or sending scam-related messages. This can include phishing links, spam, or cryptocurrency scams, which can spread rapidly due to the account's credibility and large follower base.
Immediate Actions:
Hackers are swift in their actions. They quickly change passwords and recovery details, locking out the legitimate owner. This rapid response is designed to maximize the reach and financial gain from the compromised account.
Recovery Timeline:
X doesn't provide an official recovery timeline, but cybersecurity experts offer insights:
- Quick Recovery: If the account holder has access to the registered email or phone number, recovery can be swift, often within minutes to an hour, using X's password reset feature.
- Moderate Recovery: When the account is compromised but the user is still logged in, access can be secured within one to two hours by changing passwords and revoking app permissions.
- Extended Recovery: Recovery takes longer if attackers change recovery information. In such cases, it can take one to three days to regain access, as users must undergo identity verification. Formal recovery requests to X Support typically take three to seven business days.
- High-Profile Cases: For verified accounts, recovery can be even more challenging. These cases often require manual review due to the risk of impersonation, phishing, or large-scale fraud. Recovery may take up to two weeks or longer.
Prevalence of Verified Account Hacks:
Verified accounts are indeed frequently targeted. While X doesn't release platform-wide statistics, cybersecurity firms like Guardio report thousands of compromised accounts daily, affecting both ordinary users and verified profiles.
The SentinelOne Report:
A report by The Record, citing SentinelOne researchers, highlights an active phishing campaign targeting prominent X accounts. This campaign demonstrates the growing financial incentives for hackers and the ease of abusing influential social media accounts.
Why Verified Accounts are High-Value Targets:
Verified accounts are highly sought-after because they provide immediate access to a large audience and a higher level of trust. A single post from a compromised verified account can reach thousands or millions within minutes, amplifying the impact of scams or misinformation.
Prevention and Protection:
Cybersecurity specialists recommend several measures to protect verified accounts:
- Two-Factor Authentication: Enabling two-factor authentication adds an extra layer of security.
- Unique Passwords: Using strong, unique passwords is essential.
- Caution with Emails: Users should remain cautious of unsolicited emails or messages claiming to be from X support, as these could be phishing attempts.