Automatic text replacement let users spoof URLs ending in x, like netflix.com.

Elon Musk’s clumsy brand shift from Twitter to X caused a potentially big problem this week when the social network started automatically changing “twitter.com” to “x.com” in links. The automatic text replacement reportedly applied to any URL ending in “twitter.com” even if it wasn’t actually a twitter.com link.

The change apparently went live on X’s app for iOS, but not on the web version. It seems to have been a problem for a day or two before the company fixed the automatic text replacement so that it wouldn’t affect non-Twitter.com domains.

Security reporter Brian Krebs called the move “a gift to phishers” in an article yesterday. It was a phishing risk because scammers could register a domain name like “netflitwitter.com,” which would appear as “netflix.com” in posts on X, but clicking the link would take a user to netflitwitter.com.

“A search at DomainTools.com shows at least 60 domain names have been registered over the past two days for domains ending in ‘twitter.com,’ although research so far shows the majority of these domains have been registered ‘defensively’ by private individuals to prevent the domains from being purchased by scammers,” Krebs wrote.

  • @zeppo@lemmy.world
    link
    fedilink
    English
    67 months ago

    No, apparently what happens is people post netflitwitter.com, linking to netfltwitter.com, and the X app changes the visible link text to netflix.com but not the link target.

    The way you’re describing it is the reverse, like people post netflix.com and the link is changed to netflitwitter.com. That’s not what they’re doing. Or, if it was that people posted netflitwitter.com and it linked to netflix.com, how would that be a problem?

    • @quindraco@lemm.ee
      link
      fedilink
      -17 months ago

      No. If the link was left pristine, phishing would be impossible, because the original links we’re discussing went to genuine sites and the displayed link would be obviously garbage.

      The whole problem is that people are linking to netflitwitter with a display of netflitwitter, then the regex changes the link target, so you see the original, sane address, click on it, and get deceived into going to a target the regex fabricated.