Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Security » Verified X accounts being traded on the darkweb
2 min Security

Verified X accounts being traded on the darkweb

Floris Hulshoff PolJanuary 4, 2024 5:02 pmJanuary 4, 2024
Verified X accounts being traded on the darkweb

Verified X ‘Gold’ accounts of the social media platform X are being taken over en masse by hackers. Subsequently, these accounts are being traded on the darkweb, as security researchers from India’s CloudSEK found out.

In 2023, X introduced its so-called X Verified or Gold accounts for the social media platform. These paid accounts indicate that X has independently verified that the account legitimately belongs to a well-known company or celebrity.

This option should give these companies and individuals more security, after the company also made the familiar blue checkmark accessible to all users as a paid verification option. For years, this was considered the sign that an account was authentic until, under Elon Musk, this system was revamped.

Trading in hijacked X Gold accounts

CloudSEK’s research shows that X Gold accounts are now being attacked and hijacked en masse with brute-force attacks. In addition, they also appear to be taking over non-Gold accounts of (well-known) companies that have not been used for a while. These are then upgraded to an X Gold account and further traded.

According to the research, hundreds of X Gold accounts are now being traded on the darkweb. There, these accounts cost an average of $2,000 each. Malicious buyers can then use them to spread and host phishing links, start disinformation campaigns, set up malicious financial operations or use fake content to damage the reputations of companies or individuals.

Countering breaches

To protect their X Gold accounts, companies and acquaintances should therefore monitor entries on X more frequently to check whether they have been compromised.

Examples include detecting fake profiles, unauthorized product entries, misleading ads and other malicious content. In addition, companies and individuals must implement very strong passwords for login credentials.

Also read: Mandiant’s X account hacked

Tags:

account hijacking / cloudsek / Research / X (Twitter)

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

Massive X data leak affects over 200 million users

X increasingly attractive to business audiences, but will they return?

X now lets all users make audio and video calls

Mandiant’s X account hacked

Editor picks

SAP launches RPT-1: the end of machine learning?

A relational foundation model

SAP opens platform with MCP: AI agents can communicate with SAP

All developers can get started with SAP

AI data centers: the road to 1 megawatt and its challenges

Schneider Electric plays a central role in making AI data centers possible

Cloudflare apologizes after global outage, what went wrong?

An internal update, not a DDoS attack

Techzine.tv

AFX is NetApp's data platform of the future with integrated AI data prep

AFX is NetApp's data platform of the future with integrated AI data prep

In-depth conversation about Agentforce IT service and how it wants to change the ITSM market

In-depth conversation about Agentforce IT service and how it wants to change the ITSM market

SAP's AI migration tools from ECC to S/4HANA: faster and cheaper ERP transitions

SAP's AI migration tools from ECC to S/4HANA: faster and cheaper ERP transitions

Why your SOC needs a ROC, according to Qualys

Why your SOC needs a ROC, according to Qualys

Read more on Security

Microsoft Entra eliminates identity risks posed by AI agents

Microsoft Entra eliminates identity risks posed by AI agents

Organizations often do not know which AI agents are active in their own systems. Like Okta, Microsoft hopes t...

Erik van Klinken 1 day ago
Palo Alto integrates Prisma AIRS with IBM, ServiceNow, and more

Palo Alto integrates Prisma AIRS with IBM, ServiceNow, and more

Prisma AIRS, the AI security component of Palo Alto Networks, is getting new integrations. Agents from Factor...

Erik van Klinken 6 hours ago
Cybersecurity needs more women
Top story

Cybersecurity needs more women

Cybersecurity has become an indispensable part of every organization. As threats become more complex and digi...

Berry Zwets November 6, 2025
Cloudflare apologizes after global outage, what went wrong?
Top story

Cloudflare apologizes after global outage, what went wrong?

An internal update, not a DDoS attack

Erik van Klinken 11 hours ago

Expert Talks

Redefining the Software Development Lifecycle in the Age of AI

Redefining the Software Development Lifecycle in the Age of AI

For developers, the best coding happens when they’re in a state of ...

AI Integrity: The Invisible Threat Organizations Can’t Ignore

AI Integrity: The Invisible Threat Organizations Can’t Ignore

AI systems are increasingly making decisions that impact people, proc...

Three Ways Secure Modern Networks Unlock the True Power of AI

AI is rapidly becoming the main driver of innovation for businesses, ...

Data Governance in the Cloud: Balancing Innovation and Regulation

The cloud has become the backbone of modern business, enabling rapid ...

Tech calendar

BrickCon The Databricks Community Conference

December 3, 2025 Orlando, Florida

Appdevcon

March 10, 2026 Amsterdam

Webdevcon

March 10, 2026 Amsterdam

Dutch PHP Conference

March 10, 2026 Amsterdam

GITEX ASIA 2026

April 8, 2026 Singapore

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2025 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement