Meet @cryptoaover1111, @cryptodover1111, @cryptofover1111, @cryptoiover1111, @cryptopover1111, @cryptosover1111, @cryptogover1111, and @cryptolover1111, an octet of similarly-named Twitter accounts that you probably don't want to purchase.

cc: @ZellaQuixote
In addition to the eight accounts presently up for sale, we found two others with the same naming scheme: @cryptotover1111 and @cryptouover1111. All ten accounts were created in 2021 and have tweeted/retweeted a small amount of cryptocurrency content via Twitter for Android.
(BTW, buying/selling Twitter accounts is against TOS, and websites offering such services should be regarded as potentially unsafe and one should take precautions when visiting then, such as using Tor.)
Interestingly, @cryptoaover1111 and its nine similarly-named friends have a lot of the same followers. These appear to be a mix of legitimate cryptocurrency accounts, followback accounts, and various spam networks.
4022 of the accounts following one or more of the ten crypto*over1111 accounts are "followback" accounts - accounts that advertise in their profiles that they will follow any account back. This table shows some examples:
89 of the most recent followers of @cryptoaover1111 and its nine similarly-named friends are part of a much larger botnet whose members (so far) mostly follow one another. (The plagiarism mentioned in the graph title is explained further down the thread.)
This botnet consists of 6716 accounts created in batches between May and August 2021. Most have tweeted exactly once, although some have no tweets and a few have up to five. None has ever liked a tweet, and all follow hundreds or thousands of other members of the botnet.
This network has (allegedly) posted all of its tweets thus far with Twitter web products, both the current "Twitter Web App" and the "Twitter Web Client" that Twitter shut down a year before these accounts were created. Tweet content is in a mix of English and Chinese.
The accounts in this botnet use the same pool of repeated phrases for both tweet content and profile biographies. The phrases appear to be plagiarized from all over the internet, and are centered on no particular topic.
As with their tweet content and biographies, the profile images used by these bots are stolen. (A few have default pics rather than stolen ones.) TinEye and Google outperformed Yandex at tracking down previous uses of this set of images.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Conspirador Norteño

Conspirador Norteño Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @conspirator0

12 Sep
It's a great day for a look at the astroturf network that followed @ElectionWiz (ID 1290635110149169152, formerly named @Wizard_Predicts among other things) back at the beginning of its Twitter career (immediately after its first follower, @Barnes_Law).

cc: @ZellaQuixote
This network consists of (at least) 7991 accounts, most of which were created in the latter half of 2020 or the first half of 2021. The accounts in the network all follow at least 20 times as many accounts as they have followers of their own.
This astroturf network follows a variety of accounts. The most frequently followed accounts are @RanaSarkar, @AAldekhayel, and @thouse_opinions (the latter of which is marked "China state-affiliated media" by Twitter). @ElectionWiz is the 24th most-followed account.
Read 6 tweets
6 Sep
It's #LaborDay weekend, and a botnet with stolen profile pics is retweeting various giveaway tweets and pretending to be from Michigan.

cc: @ZellaQuixote
This botnet consists of 11 accounts created in early 2021. All follow far more accounts than they are followed by, and ll but one have their profile location set to somewhere in Michigan (@JacobMassengil's location is simply "USA").
Each account in this botnet tweets via its own custom app with a name consisting of 30 random letters and digits (e.g., @CarlaFreemly tweets via "LcOkMRRPjRblxHlQPo8OnwltoYXFWg"). Most also have older tweets sent via apps that were subsequently removed (the erased******* apps).
Read 5 tweets
4 Sep
Meet @jessica05181, a Twitter account with 32K followers that ostensibly belongs to a @Guardian reporter by the name of "Jessica Claire". As is often the case, things are not as they seem.

cc: @ZellaQuixote
A Google search of the Guardian's website for "Jessica Claire" turns up no articles written by anyone named "Jessica Claire", and although @jessica05181 has shared 111 @Guardian articles on Twitter, none of the authors have names remotely similar to "Jessica Claire".
As it turns out, @jessica05181 (permanent ID 1036130530666983425), wasn't always named @jessica05181. Previous names include @Adrian84474494 (which may be its original handle) and @thrawedmclag, and at least one early reply refers to it as "Adrian".
Read 7 tweets
1 Sep
It's a great day for a thread on some interesting aspects of the tweets and followers of @Ravagiing (permanent ID 2191704602), the right-wing Twitter account featured in a recent @BuzzFeedNews investigation.

cc: @ZellaQuixote
buzzfeednews.com/article/kenben…
Although @Ravagiing is presently a right-wing Twitter account that tweets in English, it wasn't always so. Back in early 2014, it tweeted almost exclusively in Arabic. It appears to have gone silent in late April 2014 and woke back up in April 2018 as an English-language account.
Back in 2014 when it tweeted in Arabic, @Ravagiing was 100% automated, tweeting around the clock via a custom app. Most of the automated Arabic content looks like Quran verses.
Read 11 tweets
29 Aug
Spam networks tweeting propaganda about Xinjiang have been a recurring thing for the past year or so. Here's one such network that appears to be trying to get specific bloggers and journalists to notice specific Xinjiang-related YouTube videos.

cc: @ZellaQuixote
This particular network consists of 354 accounts created between July 2019 and August 2021. Hilariously, the operators of the network on multiple occasions created multiple accounts in a row with the same name (e.g. @cumberland_ted and @ted_cumberland, created 4 minutes apart).
This network's content is repetitive, and mostly consists of articles and videos related to Xinjiang (both feel-good stories and denial of human rights abuses). Most of the repetitive tweets have at least two accounts tagged in them, generally bloggers and media accounts.
Read 6 tweets
28 Aug
How did these six seemingly unrelated tweets end up with thousands of likes but few or no retweets? Are the likes coming from a large astroturf botnet created over the last month? (Spoiler: yup.) #FridayAstroturf

cc: @ZellaQuixote
This botnet consists of (at least) 13870 accounts with lowercase display names created between July 29th and August 26th, 2021. None has tweeted as of yet, but all follow dozens or hundreds of accounts and most have liked dozens or hundreds of tweets.
The bots in this network do two things: like tweets and follow accounts. The account whose tweets they've liked most frequently is @JuanOrlandoH, the President of Honduras. Many (not all) of the other accounts that received lots of likes from the botnet are cryptocurrency-themed.
Read 8 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!

:(