OzB@OzBullding
🚨 Everyone: SECURITY ANNOUNCEMENT (Telegram)
If you receive any message from my old Telegram username @ozbulld on telegram : do NOT trust it. That account is no longer under my control.
Do NOT click anything it sends. no “calendar invite”, no “verification”, no “doc”, no “airdrop”, no “KYC”, no “meeting”.
Especially NO links: Zoom / Google Meet / Calendly / “private call” / “deck” / “drive” / “Notion” / anything.
If it looks urgent or “important”, assume it’s engineered that way.
Now, what happened (so it doesn’t happen to you): 🙏
A contact’s Telegram got compromised. The attacker used a simple but effective play: social trust. I was invited to a meeting, a link was shared, I clicked, thinking it was legit. This wasn’t a noisy “virus” story. Antivirus showed nothing. Because the real target wasn’t my Mac… it was Telegram session control.
Here’s the uncomfortable truth: 2FA protects logins, but session hijacking targets the layer you don’t see.
Days later my account was effectively wiped/reset: chats gone, username reassigned, and logging in with the same number produced an empty account. That’s when it clicked: this wasn’t “bad luck”, it was a designed attack path.
I’m posting this for two reasons:
1) Protection! so nobody gets pulled into a chain attack through my identity. Please never click any link from "ozbulld" account on telegram!!
2) Education! because this is becoming the new normal.
My recommendations (do this today):
✅ Enable Passkeys + Two-Step Verification + Recovery Email
✅ Check Active Sessions and terminate anything you don’t recognize
✅ Treat “friendly meeting links” as hostile until proven otherwise
✅ Verify via a second channel before clicking anything
I took the hit so you don’t have to. Stay sharp 💪
If you know a better solution, DM me. Always open to smarter defenses