Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Exclusive LegalZoom Promo Code for 10% Off Services

    July 29, 2025

    Top LG Promo Codes for July 2025

    July 29, 2025

    Microsoft Edge transforms into an AI browser with new Copilot Mode

    July 28, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » My X Account Was Hijacked to Sell a Fake WIRED Memecoin. Then Came the Backlash
    Business

    My X Account Was Hijacked to Sell a Fake WIRED Memecoin. Then Came the Backlash

    News RoomBy News RoomMay 12, 20253 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    In theory, the more prominent the X account, the greater the potential return on the pump-and-dump, because many more people are likely to buy into the coin the scammer promotes. I tweet infrequently—mostly links to my articles—and have fewer than 2,800 followers, making me somewhat of an unlikely target. But I was valuable to the scammer for the likelihood that I am considered a trusted authority in my capacity as a crypto reporter.

    “The greater exposure during the pump, the more likely it is that multiple investors will buy into the messaging and buy into the eventual dump of the coin,” says John Powers, president at private investigation agency Hudson Intelligence.

    X did not respond to a request for comment.

    Though crypto coins have been used in pump-and-dump schemes for years, these maneuvers have become easier to execute with the arrival of memecoin launchpads, which allow anybody to create a coin instantly, at no cost. In my case, the scammer minted the WIRED-branded coin using Pump.Fun, by far the largest launchpad platform.

    “A lot of coins are used for pump-and-dumps on Pump.Fun. And when [bad actors] combine a pump-and-dump with the hack of an X account, it’s potentially lucrative for them if executed correctly,” says Larratt.

    “We continue to invest in making the platform safe for users,” said Pump.Fun spokesperson Troy Gravitt in a statement to WIRED. “When we find allegations of fraud, such as hacked X accounts shilling token scams, we’re able to delist those tokens from our front end to mitigate any threat they might pose to unsuspecting users.”

    Despite the prevalence of memecoin rug pulls, investors continue to pile into coins. “A lot of the appreciation of value in memecoins occurs very early in the process, soon after launch,” says Powers. “There’s this chance you might get in at the right moment and make a killing … Timing is everything. The legitimacy of the offering is a secondary concern to many people it seems.”

    I realized that my X account had been taken over on February 17, the day before the fraudulent WIRED coin was released. Have I Been Pwned, a service that lets people check whether their information has been exposed in data breaches and hacks, indicates that my X credentials had previously been distributed on a hacking forum, providing one possible explanation for my account having been compromised. Fatally, I had not put in place two-factor authentication, which meant that my password was all somebody needed to seize control of the account.

    Because the scammer had swapped out my recovery email, I had to go through a longer, more arduous recovery process with X, which meant that I did not immediately regain my account. By the following morning, it was already too late. An analysis of transaction data shows that the person or group who hacked my X account created the WIRED token at 1:20 am UTC that morning.

    When somebody creates a coin on Pump.Fun, they release 1 billion units into circulation and typically purchase some themselves at a nominal rate. In this case, the scammer snapped up around 5 percent of the total supply with the same crypto wallet used to issue the coin, then acquired more using two separate wallets immediately after trading began, according to analysis by Powers and Chainalysis. They used these secondary wallets to conceal the extent of their holdings from the investing public. “You can buy a certain amount of your own token. But if you buy a lot, nobody is going to buy in, because it’s very suspicious,” says Larratt.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticlePeacock’s NBA coverage will add an overlay with live shot stats
    Next Article Apple could use AI to help your iPhone save battery

    Related Posts

    Trump’s Anti-Bias AI Order Is Just More Bias

    July 28, 2025

    Cursor’s New Bugbot Is Designed to Save Vibe Coders From Themselves

    July 26, 2025

    Americans Are Obsessed With Watching Short Video Dramas From China

    July 25, 2025

    Trump Says He’s ‘Getting Rid of Woke’ and Dismisses Copyright Concerns in AI Policy Speech

    July 25, 2025

    Trump’s AI Action Plan Is a Crusade Against ‘Bias’—and Regulation

    July 24, 2025

    A New Era for WIRED—That Starts With You

    July 24, 2025
    Our Picks

    Top LG Promo Codes for July 2025

    July 29, 2025

    Microsoft Edge transforms into an AI browser with new Copilot Mode

    July 28, 2025

    Women’s ‘red flag’ app Tea is a privacy nightmare

    July 28, 2025

    Samsung’s One UI 8 might shut down bootloader unlocking on Galaxy phones

    July 28, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    News

    The controversial legal tactic The Trump Organization is using to take down fake merch

    By News RoomJuly 28, 2025

    Unauthorized merch promoting Donald Trump — from hats and mugs to signs and T-shirts —…

    Sony calls Tencent game ‘slavish clone’ of Horizon in new lawsuit

    July 28, 2025

    Yet another Pixel 6A caught fire

    July 28, 2025

    Your Whistle pet tracker will stop working next month

    July 28, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.