
Recent reports indicate that X (formerly Twitter)'s t.co link shortening service has become a significant vector for cyberattacks, ranking as the third most abused platform for Living Off Trusted Sites (LOTS) attacks in the first quarter of 2025. Threat actors are increasingly leveraging the t.co domain to disguise malicious links, making it challenging for users to identify phishing attempts. This development highlights the dual nature of URL shorteners, designed for convenience and security but also susceptible to misuse.
The t.co service, a proprietary URL shortener used by X, automatically converts all links posted on the platform. Its primary functions include protecting users from harmful websites by checking links against a list of dangerous sites, providing analytics on link clicks, and offering a quality signal for content relevance. Despite these protective measures, the service's ability to obscure original URLs is being exploited by malicious actors.
According to a report from Sublime Security, the abuse often involves sophisticated phishing payloads, such as those mimicking DocuSign or Citrix ShareFile notifications. These attacks frequently employ brand confusion and legitimate-looking sender details to enhance their credibility, bypassing traditional detection mechanisms. The use of t.co links adds a layer of obfuscation, making it harder for users to discern the true destination of a link before clicking.
Beyond security concerns, the widespread use of t.co also presents challenges for users regarding content archival. When users download their tweet archives, the original URLs are often replaced with their shortened t.co counterparts. Should the t.co service ever become unavailable, these archived links would lose their context, potentially rendering historical data incomplete or inaccessible. This issue underscores a broader concern about the long-term integrity of digital content shared on social media platforms.
While X maintains that its link service is designed to enhance user safety and provide developer value, the escalating abuse by phishers necessitates continuous vigilance and evolving security protocols. The platform's ongoing efforts to combat these threats are crucial in maintaining user trust and the integrity of shared information. Users are advised to exercise caution when encountering unfamiliar links, even those shortened by trusted services.