SlowMist: A Guide to Securing Your X Account with a Safety Checkup

8/16/2024, 2:08:28 AM
Intermediate
SocialFiSecurity
This article offers a comprehensive guide on how to conduct a security checkup on your account, covering how to review authorized apps, check delegation settings, and monitor login activity and devices. It also recommends activating two-factor authentication (2FA) and setting up extra password protections to strengthen your account's security.

Background Overview

There has been a recent surge in incidents where Web3 projects or public figures have had their X accounts hacked and used to post phishing tweets. Hackers employ various techniques to steal user accounts, with some of the more common methods including:

  • Tricking users into clicking on fake Calendly or Kakao meeting invitation links, which then allow them to hijack account permissions or take control of users’ devices;
  • Sending direct messages that lure users into downloading malicious software (disguised as games, meeting apps, etc.), which can steal private keys, mnemonic phrases, and potentially compromise X account security;
  • Exploiting SIM Swap attacks to gain control of X accounts that are tied to a phone number.

The SlowMist security team has helped resolve several such incidents. For example, on July 20th, the X account of the TinTinLand project team was hacked, and the attacker posted a phishing link as a pinned tweet. With SlowMist’s assistance, TinTinLand quickly regained control of the account, reviewed its authorizations, and strengthened its security measures.

Due to the frequent occurrences of account breaches, many users are unsure of how to improve the security of their X accounts. In this article, the SlowMist security team will guide you through the process of performing authorization checks and setting up security measures for your X account. Below are the detailed steps.

Authorization Check

Let’s use the web version as an example. After navigating to the x.com page, click on the “More” option in the sidebar, and then select “Settings and privacy.” This area is where you can configure your account’s security and privacy settings.

Once you’re in the “Settings” section, choose “Security and account access” to manage your account’s security settings and control authorized access.

Review Authorized Applications

Phishing attacks often exploit users who inadvertently click on authorization links, granting unauthorized apps permission to post tweets from their X accounts. These compromised accounts are then used to send phishing messages.

How to Check: Go to the “Apps and sessions” section to review which applications have been granted access to your account. In the example below, the demonstration account has authorized these three applications.

When you select a specific application, you’ll be able to view the permissions it has been granted. If needed, you can remove these permissions by clicking “Revoke app permissions.”

Review Delegation Status

How to Check: Navigate to Settings → Security and account access → Delegate.

If you notice that your account has the “Allow invitations to manage” option enabled, you should go to “Members you’ve delegated” to review which accounts have access to your account. If these shared permissions are no longer needed, you should revoke the delegation immediately.

Check for Unusual Login Activity

If you suspect that your account has been accessed maliciously, you can review the login logs to identify any suspicious devices, dates, or locations.

How to Check: Go to Settings → Security and account access → Apps and sessions → Account access history.

As illustrated below, when you access “Account access history,” you can see details such as the device model, login date, IP address, and location. If you notice any unusual login activity, it could be a sign that your account has been compromised.

Check Logged-In Devices

If your X account has been compromised and you suspect unauthorized logins, you can review the devices currently logged into your account and remove the malicious device from the session.

How to Check: Choose “Log out the device shown” to log your account out from the specific device.

Security Settings

Enable 2FA (Two-Factor Authentication) To safeguard your account, you can enable 2FA, which adds an extra layer of security and helps prevent your account from being easily taken over if your password is compromised.

How to Configure: Go to Settings → Security and account access → Security → Two-factor authentication.

You can choose from the following 2FA options to strengthen your account’s security: SMS verification codes, authentication apps, and security keys.

Additional Password Protection

Beyond setting your account password and enabling 2FA, you can further secure your X account by turning on additional password protection.

How to Configure: Go to Settings → Security and account access → Security → Additional password protection.

Summary

Regularly reviewing authorized apps and monitoring login activity is essential for keeping your account secure. The SlowMist security team advises users to routinely follow the outlined steps to perform authorization checks on their X accounts. This proactive approach will help reinforce your account’s security and minimize the risk of hacker attacks. If you suspect your account has been compromised, take immediate steps: change your password, review and revoke any suspicious authorizations, and enhance your account’s security settings.

Disclaimer:

  1. This article is reprinted from [SlowMist Technology]. All copyrights belong to the original author [Yao]. If there are objections to this reprint, please contact the Gate Learn team, and they will handle it promptly.
  2. Liability Disclaimer: The views and opinions expressed in this article are solely those of the author and do not constitute any investment advice.
  3. Translations of the article into other languages are done by the Gate Learn team. Unless mentioned, copying, distributing, or plagiarizing the translated articles is prohibited.

Share

Crypto Calendar

Proje Güncellemeleri
Etherex, 6 Ağustos'ta REX token'ını piyasaya sürecek.
REX
22.27%
2025-08-06
NFT AI Ürün Lansmanı
Nuls, üçüncü çeyrekte bir NFT AI ürünü piyasaya sürecek.
NULS
2.77%
2025-08-06
dValueChain v.1.0 Lansmanı
Bio Protocol, ilk çeyrekte dValueChain v.1.0'ı piyasaya sürmeye hazırlanıyor. Amacı, DeSci ekosisteminde güvenli, şeffaf ve değiştirilemez tıbbi kayıtlar sağlamak için merkeziyetsiz bir sağlık veri ağı kurmaktır.
BIO
-2.47%
2025-08-06
Yapay Zeka Tarafından Üretilen Video Altyazıları
Verasity, dördüncü çeyrekte AI tarafından üretilen video altyazı fonksiyonu ekleyecek.
VRA
-1.44%
2025-08-06
VeraPlayer Çok Dilli Destek
Verasity, dördüncü çeyrekte VeraPlayer'a çok dilli destek ekleyecek.
VRA
-1.44%
2025-08-06

Related Articles

False Chrome Extension Stealing Analysis
Advanced

False Chrome Extension Stealing Analysis

Recently, several Web3 participants have lost funds from their accounts due to downloading a fake Chrome extension that reads browser cookies. The SlowMist team has conducted a detailed analysis of this scam tactic.
6/12/2024, 3:30:24 PM
Reshaping Web3 Community Reward Models with RWA Yields
Beginner

Reshaping Web3 Community Reward Models with RWA Yields

This article introduces the Lingo project, which combines the real value generation of RWA with the exponential growth characteristics of tokenomics. By integrating real value generation mechanisms with a global partner reward ecosystem, Lingo aims to provide a more exponential, user-friendly, and rewarding Web3 experience.
6/13/2024, 8:00:31 AM
Analysis of the Sonne Finance Attack
Intermediate

Analysis of the Sonne Finance Attack

The essence of this attack lies in the creation of the market (soToken), where the attacker performed the first collateral minting operation with a small amount of the underlying token, resulting in a very small "totalSupply" value for the soToken.
6/13/2024, 12:35:30 AM
What is a Crypto Card and How Does it Work? (2025)
Beginner

What is a Crypto Card and How Does it Work? (2025)

In 2025, crypto cards have revolutionized digital payments, with Gate Crypto Card leading the market through unprecedented innovation. Now supporting over 3000 cryptocurrencies across multiple blockchains, these cards feature AI-powered exchange rate optimization, biometric security, and customizable spending controls. Gate's improved reward structure offers up to 8% cashback, while integration with major digital wallets enables acceptance at 90 million merchants worldwide. The enhanced user experience includes real-time transaction tracking, spending analytics, and automated tax reporting. With competitive advantages over other platforms, Gate Crypto Card demonstrates how the bridge between traditional finance and digital assets has strengthened, making cryptocurrency more accessible and practical for everyday use than ever before.
5/29/2025, 2:35:39 AM
Gate Research: Exploring the SocialFi Landscape in 2024: Insights on the Path Forward, Market Trends, and Future Directions
Advanced

Gate Research: Exploring the SocialFi Landscape in 2024: Insights on the Path Forward, Market Trends, and Future Directions

While the SocialFi sector in 2024 is smaller compared to others, the strong viral potential and appeal of social projects may draw renewed global interest. This report analyzes 2024 SocialFi market performance, covering aspects like market size, user growth, key project performance, token trends, and funding conditions.
12/25/2024, 1:55:54 AM
An Overview of Musk's Love-Hate Relationship with DOGE
Beginner

An Overview of Musk's Love-Hate Relationship with DOGE

Explore the origins, features, and market performance of Dogecoin, analyze Musk's deep connection with Dogecoin, and uncover the reasons behind the surge in Dogecoin's price driven by the establishment of the "DOGE Department" during the 2024 U.S. presidential election.
12/6/2024, 3:00:35 PM
Start Now
Sign up and get a
$100
Voucher!