What is "Twitter Crypto Giveaway"?
After inspecting the "Twitter Crypto Giveaway" we determined that it is a scam. Similar to countless fake cryptocurrency giveaways, this scam promises to double the amount of Bitcoin (BTC) or Ethereum (ETH) that users transfer to it.
The scheme is presented as a giveaway created by Elon Musk - a business magnate and investor and the Twitter social networking platform. The scammers likely incorporated the two together due to the proposed acquisition of Twitter by Elon Musk in 2022. It must be emphasized that neither Elon Musk nor Twitter, Inc. are associated with this scam.
"Twitter Crypto Giveaway" scam overview
The scam is presented as a giveaway held for the purposes of hastening the mass adoption of cryptocurrencies. Allegedly, 5,000 BTC and 50,000 ETH will be given away to the participants. Users are asked to transfer from 0.1 to 200 BTC or 1 to 1,000 ETH - to take part in this giveaway. The scam promises that the amount will be doubled and sent back to the participant immediately.
As mentioned in the introduction, this giveaway is fake. Hence, the victims will not receive the increased amount and instead lose all they have transferred. Furthermore, since cryptocurrencies are virtually untraceable, victims will be unable to retrieve the transferred funds.
|Name||Twitter Crypto Giveaway scam website|
|Threat Type||Phishing, Scam, Social Engineering, Fraud|
|Fake Claim||For the cryptocurrency users transfer to the giveaway - double the amount will be returned to them.|
|Disguise||Cryptocurrency giveaway held by Elon Musk and Twitter, Inc.|
|Cyber Criminal Cryptowallet Addresses||14nDGZLhBnfNBwJ9pckccDfdK9Ltopgc38 (Bitcoin), 0x8b0725961c3986E4605610137C56A6648e93185E (Ethereum)|
|Detection Names (twitter-elon[.]net)||Combo Cleaner (Malware), CRDF (Malicious), CyRadar (Malicious), ESET (Phishing), Fortinet (Phishing), Full List Of Detections (VirusTotal)|
|Serving IP Address (twitter-elon[.]net)||22.214.171.124|
|Distribution methods||Compromised websites, rogue online pop-up ads, potentially unwanted applications.|
|Damage||Loss of sensitive private information, monetary loss.|
|Malware Removal (Windows)||
To eliminate possible malware infections, scan your computer with legitimate antivirus software. Our security researchers recommend using Combo Cleaner.
Cryptocurrency-centric scam examples
It is pertinent to mention that the Internet is rife with dubious, deceptive, and malicious content. Scams employ a wide variety of disguises and use different models to gain and subsequently abuse users' trust. Therefore, we strongly advise exercising caution when browsing.
How did I open a scam website?
Scam websites are rarely accessed intentionally. Users can get redirected to them the moment they access a page that employs rogue advertising networks or when they interact with it (e.g., click buttons, links, ads, etc.).
Intrusive advertisements and spam browser notifications promote online scams as well. Mistyping a URL can also result in a redirect (or a redirection chain leading) to a deceptive webpage. Furthermore, adware can display ads that endorse scams or force-open pages that run deceitful content.
How to avoid visiting scam websites?
Online scams are primarily endorsed through redirects caused by mistyped URLs, sites using rogue advertising networks, intrusive ads, spam browser notifications, or installed adware.
Therefore, we recommend being careful when typing website addresses (URLs). Additionally, we advise against using sites that offer pirated programs/media or other questionable services (e.g., Torrenting, illegal streaming/downloading, etc.) - since they are usually monetized through rogue advertising networks.
To avoid receiving deceptive browser notifications - do not permit suspicious webpages to deliver them (i.e., do not click "Allow", "Allow Notifications", etc.). Instead, ignore or deny notification delivery (i.e., clicking "Block", "Block Notifications", etc.).
What is more, always use official/verified download sources and exercise caution when installing (e.g., use the "Custom/Advanced" settings, etc.) - to avoid allowing harmful software into the system. If your computer is already infected, we recommend running a scan with Combo Cleaner Antivirus for Windows to automatically eliminate all threats.
Text presented in "Twitter Crypto Giveaway" scam:
Giveaway Rules Bonus FAQ Transactions
Hurry up and take part in the giveaway of 5,000 BTC & 50,000 ETH
During this unique event we will give you a chance to win 5,000 BTC or 50,000 ETH, have a look at the rules and don't miss on your chance!
More info Participate in the giveaway
Bitcoin & Ethereum
Bitcoin (BTC) 5,000 BTC
Ethereum (ETH) 5,000 ETH
We believe that Twitter and Bitcoin & Ethereum coin will make the world more fair. To speed up the process of cryptocurrency mass adoption, We decided to run 5,000 BTC & 50,000 ETH giveaway.
To participate you just need to send from (0.1 BTC or 1 ETH) to (200 BTC or 500 ETH) to the contribution address and we will immediately send you back (0.2 BTC or 2 ETH) to (400 BTC or 1,000 ETH) (x2) to the address you sent it from.
For Example Bitcoin
If you send 0.1+ BTC , you will get 0.2+ BTC back.
If you send 0.5+ BTC, you will get 1+ BTC back.
If you send 1+ BTC, you will get 2+ BTC back.
If you send 5+ BTC, you will get 10+ BTC back.
If you send 50+ BTC , you will get 100+ BTC back.
If you send 200+ BTC, you will get 400+ BTC back.
For Example Ethereum
If you send 1+ ETH, you will get 2+ ETH back.
If you send 5+ ETH, you will get 10+ ETH back.
If you send 10+ ETH, you will get 20+ ETH back.
If you send 50+ ETH, you will get 100+ ETH back.
If you send 200+ ETH, you will get 400+ ETH back.
If you send 500+ ETH, you will get 1,000+ ETH back.
You can only participate once.
3,372.6 BTC already sent to participants!
Hurry up and take part in the giveaway!
Use this QR code to participate
3,372.6 BTC 5,000 BTC
You can send BTC to the following address:
Waiting for payment
36,577 ETH already sent to participants!
Hurry up and take part in the giveaway!
Use this QR code to participate
36,577 ETH 50,000 ETH
You can send ETH to the following address:
Waiting for payment
What do I have to do to participate in the giveaway?
How long will it take me to get my bonus?
Who is the sponsor of this giveaway?
How many times can I participate in the giveaway?
How do I get my bonus?
Transactions for Addresses
14nDGZLhBnfNBwJ9pckccDfdK9Ltopgc38 & 0x8b0725961c3986E4605610137C56A6648e93185E
The appearance of "Twitter Crypto Giveaway" scam (GIF):
Instant automatic malware removal:
Manual threat removal might be a lengthy and complicated process that requires advanced computer skills. Combo Cleaner is a professional automatic malware removal tool that is recommended to get rid of malware. Download it by clicking the button below:
- What is Twitter Crypto Giveaway scam website?
- How to identify a pop-up scam?
- How do pop-up scams work?
- How to remove fake pop-ups?
- How to prevent fake pop-ups?
- What to do if you fell for a pop-up scam?
How to identify a pop-up scam?
Pop-up windows with various fake messages are a common type of lures cybercriminals use. They collect sensitive personal data, trick Internet users into calling fake tech support numbers, subscribe to useless online services, invest in shady cryptocurrency schemes, etc.
While in the majority of cases these pop-ups don't infect users' devices with malware, they can cause direct monetary loss or could result in identity theft.
Cybercriminals strive to create their rogue pop-up windows to look trustworthy, however, scams typically have the following characteristics:
- Spelling mistakes and non-professional images - Closely inspect the information displayed in a pop-up. Spelling mistakes and unprofessional images could be a sign of a scam.
- Sense of urgency - Countdown timer with a couple of minutes on it, asking you to enter your personal information or subscribe to some online service.
- Statements that you won something - If you haven't participated in a lottery, online competition, etc., and you see a pop-up window stating that you won.
- Computer or mobile device scan - A pop-up window that scans your device and informs of detected issues - is undoubtedly a scam; webpages cannot perform such actions.
- Exclusivity - Pop-up windows stating that only you are given secret access to a financial scheme that can quickly make you rich.
Example of a pop-up scam:
How do pop-up scams work?
Cybercriminals and deceptive marketers usually use various advertising networks, search engine poisoning techniques, and shady websites to generate traffic to their pop-ups. Users land on their online lures after clicking on fake download buttons, using a torrent website, or simply clicking on an Internet search engine result.
Based on users' location and device information, they are presented with a scam pop-up. Lures presented in such pop-ups range from get-rich-quick schemes to fake virus scans.
How to remove fake pop-ups?
In most cases, pop-up scams do not infect users' devices with malware. If you encountered a scam pop-up, simply closing it should be enough. In some cases scam, pop-ups may be hard to close; in such cases - close your Internet browser and restart it.
In extremely rare cases, you might need to reset your Internet browser. For this, use our instructions explaining how to reset Internet browser settings.
How to prevent fake pop-ups?
To prevent seeing pop-up scams, you should visit only reputable websites. Torrent, Crack, free online movie streaming, YouTube video download, and other websites of similar reputation commonly redirect Internet users to pop-up scams.
To minimize the risk of encountering pop-up scams, you should keep your Internet browsers up-to-date and use reputable anti-malware application. For this purpose, we recommend Combo Cleaner Antivirus for Windows.
What to do if you fell for a pop-up scam?
This depends on the type of scam that you fell for. Most commonly, pop-up scams try to trick users into sending money, giving away personal information, or giving access to one's device.
- If you sent money to scammers: You should contact your financial institution and explain that you were scammed. If informed promptly, there's a chance to get your money back.
- If you gave away your personal information: You should change your passwords and enable two-factor authentication in all online services that you use. Visit Federal Trade Commission to report identity theft and get personalized recovery steps.
- If you let scammers connect to your device: You should scan your computer with reputable anti-malware (we recommend Combo Cleaner Antivirus for Windows) - cyber criminals could have planted trojans, keyloggers, and other malware, don't use your computer until removing possible threats.
- Help other Internet users: report Internet scams to Federal Trade Commission.
Frequently Asked Questions (FAQ)
What is an online scam?
Online scams are deceptive messages designed to trick users into performing specific actions, e.g., transferring money/cryptocurrency, calling fake support lines, downloading/installing and/or purchasing software, disclosing private information, and so on.
What is the purpose of online scams?
Online scams are designed to generate revenue for the cyber criminals. For example, scammers can profit by obtaining funds through deception, promoting software, abusing or selling private data, spreading malware, etc.
Why do I encounter online scams?
Online scams are promoted on various rogue websites. Most users enter such sites via redirects caused by webpages using rogue advertising networks, mistyped URLs, intrusive adverts, spam browser notifications, or adware.
Will Combo Cleaner protect me from online scams?
Combo Cleaner can scan visited websites and detect rogue, deceptive, and malicious ones. Therefore, you will be warned immediately, and Combo Cleaner will restrict all further access to such sites.