New Exploit Targets X/Twitter Ad URL Feature to Trick Users

A newly discovered financial scam is exploiting a loophole in X/Twitter’s advertising platform, allowing threat actors to spoof trusted domains such as “cnn.com” within ad display URLs.

The campaign, first observed by Silent Push Threat Analysts leverages this vulnerability to redirect users to fraudulent cryptocurrency websites impersonating Apple and its CEO, Tim Cook, as part of a fake “iToken” presale scheme.

Technical Exploit Overview

The attack capitalizes on the way X/Twitter constructs and displays links within promoted posts.

When a user incorporates a URL in a tweet, X/Twitter’s bot scrapes metadata to generate a Twitter card.

By differentiating between the Twitter bot’s user agent and that of real browsers, attackers can redirect the bot to a legitimate domain-such as cnn[.]com-while real users are covertly redirected to a malicious site, such as ipresale[.]world.

As a result, the advertisement appears to originate from cnn[.]com, instilling false trust in the viewer.

In this campaign, the displayed ad URL was manipulated to show “From CNN[.]com.”

However, clicking the ad started a multi-stage redirect, passing through shortened URLs (e.g., bit[.]ly/4k4X1Tz, t[.]co/OswjDCIcFI) before finally landing users on ipresale[.]world, a clone site designed to promote the fraudulent “Apple iToken” cryptocurrency.

X/Twitter
Screenshot of X/Twitter ad abusing the Apple brand

Here, users are enticed to register accounts and are presented with 22 unique wallet addresses for various cryptocurrencies, including Bitcoin, Ethereum, and USDT, to purchase the fake token.

Infrastructure and Evolution of the Threat

Silent Push’s investigation revealed that this campaign is not isolated. Nearly 90 similar domains have been identified since 2024, sharing infrastructure, visual assets (including Apple and X/Twitter-themed favicons), and financial lures-many leveraging the same server infrastructure and name servers, primarily hosted on providers like Hetzner and Cloudflare.

Further technical pivots using CSS file hashes and favicon fingerprints enabled analysts to map an expansive network of associated domains, many registered on PublicDomainRegistry and mapped to ASN “Online SAS, FR.”

X/Twitter
Screenshot of the Order ID error message

Additionally, the campaign exhibits a pattern of leveraging URL shorteners and dynamic redirects, updating destinations post-ad approval to avoid detection and maximize reach.

The scammers have continued to iterate on their tactics: a second ad, detected on May 5, 2025, employed a new redirect chain (bit[.]ly/4iS1W9p → chopinkos[.]digital → itokensale[.]live), but ultimately led to another near-identical “iToken” scam site.

Forensic analysis of these websites showed consistent use of reused web assets, unique JavaScript/CSS, and shared wallet addresses-strong evidence of a coordinated and persistent threat actor group.

This campaign underscores the risks posed by seemingly small platform vulnerabilities.

By spoofing the display URL in X/Twitter ads, the perpetrators effectively sidestep traditional user vigilance, exploiting the trust placed in recognized news brands and the Apple identity.

Their sophisticated web infrastructure, rapid domain registration, and continuous asset reuse suggest an organized and well-resourced operation.

Silent Push analysts advise all organizations to remain vigilant, block the identified domains and associated infrastructure, and monitor similar exploit vectors.

The indicators of compromise (IOCs) described below provide actionable threat intelligence for defenders.

Indicators of Compromise (IOC)

TypeIndicatorNotes (Where applicable)
IP Address51.15.17[.]214Online SAS Hosting
Domainipresale[.]worldFake iToken scam landing page
Domainitokensale[.]liveRedirected scam campaign
Domainisale[.]ltdCopycat scam site
Domaini-token[.]orgOffline; previous campaign infrastructure
Domainchopinkos[.]digitalRedirector, registered May 5, 2025
Domainx-token24[.]xyzAdditional scam infrastructure
Name Serverns1.chsw.host, ns2.chsw.hostSuspicious, seen in financial scam domains
Favicon (MD5)4f658b9a7d067de5238644b78d8d09ccApple impersonation
Favicon (MD5)e8c5c5829b630dcf61b55f271ac6c085X/Twitter impersonation
Wallet (BTC)bc1qw7cs3wsgryerfhqz3ekd9h34kcdy75nckkwm79Scam wallet address
Wallet (ETH)0x2a4Ca7B6D5FEA094e02f152D712bFD49de6D3410Scam wallet address

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here