Get fresh insights, pro tips, and thought starters–only the best of posts for you.
Twishing is a phishing attack carried out through Twitter/X, where cybercriminals use fake accounts, malicious links, direct messages, or impersonation tactics to steal sensitive information. The term combines “Twitter” and “phishing.” Attackers often pose as brands, customer support agents, or verified users to trick victims into revealing credentials, payment details, MFA codes, or corporate login information.
For IT teams, twishing is dangerous because it exploits trust in social media interactions and bypasses many traditional email-focused phishing defenses.
A typical twishing attack follows a simple pattern:
Unlike traditional email phishing, twishing relies on social media engagement and real-time interaction, making scams appear more authentic and difficult for users to identify quickly.
Twishing attacks exploit urgency, trust, and public engagement. Attackers frequently target users through replies to trending posts or customer complaints, increasing visibility and making fraudulent accounts appear credible.
Common twishing tactics include:
| Tactic | Goal |
| Fake customer support accounts | Steal login credentials |
| Crypto giveaway scams | Collect wallet information |
| Brand impersonation posts | Redirect users to phishing sites |
| Malicious shortened URLs | Hide fraudulent destinations |
Modern hybrid work environments increase exposure because employees regularly access business applications, social media accounts, and collaboration tools from personal mobile devices.
Organizations can reduce twishing risks with layered security controls and employee awareness programs.
Recommended security measures include:
Enterprises should also implement endpoint management policies that secure mobile devices used for work-related communication and account access.
Hexnode UEM helps enterprises manage corporate and BYOD devices from a centralized console. IT teams can configure compliance policies, manage applications, apply device restrictions, and use web content filtering to block or allow specific URLs on supported devices.
For organizations handling sensitive business data, unified endpoint management helps enforce device, app, compliance, and web access controls across managed endpoints. These controls are especially useful in remote and hybrid work environments where employees frequently interact with corporate services through mobile devices and social platforms.
Twishing succeeds when attackers exploit trust on social media platforms, making user awareness, account protection, and endpoint security essential for enterprise defense.