The accounts were used to catfish security researchers into downloading malware in a long-running cyber-espionage campaign attributed to North Korea.
https://threatpost.com/twitter-suspends-security-researchers/175524/
Researchers have found three backdoors and four miners in attacks exploiting the Log4Shell vulnerability, some of which are still ongoing.
https://threatpost.com/log4jshell-swarm-vmware-servers-miners-backdoors/179142/