Close Menu
Şevket Ayaksız

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Microsoft offers free AI video tool in Bing app

    Haziran 4, 2025

    Intel’s Bartlett Lake and Wildcat Lake CPUs leak online

    Haziran 4, 2025

    Sony PS5 DualSense controller now $54.99

    Haziran 4, 2025
    Facebook X (Twitter) Instagram
    • software
    • Gadgets
    Facebook X (Twitter) Instagram
    Şevket AyaksızŞevket Ayaksız
    Subscribe
    • Home
    • Technology

      Intel’s Bartlett Lake and Wildcat Lake CPUs leak online

      Haziran 4, 2025

      MSI revives Cyclone design for new RTX 5060

      Haziran 4, 2025

      Unlock Desktop GPU Power with Asus ROG XG Station 3

      Mayıs 27, 2025

      OpenSilver Expands Cross-Platform Reach with iOS and Android Support

      Mayıs 27, 2025

      Introducing AMD’s 96-Core Threadripper 9000 CPUs: A New Era in Computing

      Mayıs 22, 2025
    • Adobe
    • Microsoft
    • java
    • Oracle
    Şevket Ayaksız
    Anasayfa » Undermining Security: Hackers’ Uncomplicated Approach to SEC’s X Account through SIM Swapping
    Tech

    Undermining Security: Hackers’ Uncomplicated Approach to SEC’s X Account through SIM Swapping

    By ayaksızOcak 26, 2024Yorum yapılmamış3 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Immediately after the exchange closed on January 9, the U.S. Securities and Exchange Commission published that it had approved exchange-traded funds, or ETFs, containing the cryptocurrency Bitcoin in X (née Twitter).

    There was just one problem: The SEC never issued this announcement; someone else did it.

    Fifteen minutes after the fake post was published, agency president Gary Gensler shared that the agency had not actually approved the listing. “The @SECGov Twitter account was hacked,” he wrote, “and an unauthorized tweet was sent.”

    This revealed an obvious problem: global crypto markets trade 24/7, and this announcement clearly moved the needle. In the minutes following the unauthorized post, the Bitcoin price rose more than 4% and lost more than it gained after the SEC declared it fraudulent. The SEC began working with federal law enforcement to investigate how such a hack could have occurred. Finally, earlier this week the regulator announced on January 22 that they were considering how the breach occurred. As it turned out, the agency fell victim to a frighteningly simple scam.

    The SEC was targeted with a SIM swap in which an attacker gained access to the phone number linked to the Twitter account, reset the password for account X, and then gained carte blanche to publish whatever they wanted. To do this, attackers must first figure out which phone number is tied to the account, contact that person’s phone service provider, and persuade that provider to reassign that number to a different device, experts told Fast Company.

    “Just like you can call your phone service provider and say, ‘I dropped my phone in the toilet, I need a new phone,’ an attacker can do anything you can do during that phone call,” says Rachel Tobac. CEO of SocialProof Security.

    The SEC made the simple mistake of turning off multi-factor authentication months before the attack because its staff had difficulty sharing access with the security measure on. It’s unclear whether the agency used text message-based authentication or app-based authentication, but the latter method, which experts think is more secure, could have prevented them from losing access to the account. There are also dedicated password managers and tools for companies to securely share passwords and multi-factor authentication codes.

    Tobac says the flaw in X’s system is that it allows users to link a phone number and even requires a phone number for accounts that want to be verified. X also allows users to reset their passwords by sending a text message to their phone number; But Tobac says it’s much safer to initiate these changes through an email account that’s harder to hack. As for whether there is a way for X to catch such violations, Tobac says there is nothing to catch. “If they encourage you to add your phone number and then let you change your phone number’s password, there’s nothing to catch because that’s expected behavior,” she says.

    Katie Moussouris, founder and CEO of Luta Security, said SIM swapping attacks will continue until mobile phone operators change the way they operate or are forced to do so with stronger rules and regulations.

    “We should never have allowed organizations to authenticate through a technology that is as easily intercepted as text messages,” says Moussouris. “Until mobile phone operators are forced through regulation to make SIM swapping more difficult for attackers, we will see these attacks continue for years to come.”

    Post Views: 132
    SIM technology Twitter
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    ayaksız
    • Website

    Related Posts

    Intel’s Bartlett Lake and Wildcat Lake CPUs leak online

    Haziran 4, 2025

    MSI revives Cyclone design for new RTX 5060

    Haziran 4, 2025

    Unlock Desktop GPU Power with Asus ROG XG Station 3

    Mayıs 27, 2025
    Add A Comment

    Comments are closed.

    Editors Picks
    8.5

    Apple Planning Big Mac Redesign and Half-Sized Old Mac

    Ocak 5, 2021

    Autonomous Driving Startup Attracts Chinese Investor

    Ocak 5, 2021

    Onboard Cameras Allow Disabled Quadcopters to Fly

    Ocak 5, 2021
    Top Reviews
    9.1

    Review: T-Mobile Winning 5G Race Around the World

    By sevketayaksiz
    8.9

    Samsung Galaxy S21 Ultra Review: the New King of Android Phones

    By sevketayaksiz
    8.9

    Xiaomi Mi 10: New Variant with Snapdragon 870 Review

    By sevketayaksiz
    Advertisement
    Demo
    Şevket Ayaksız
    Facebook X (Twitter) Instagram YouTube
    • Home
    • Adobe
    • microsoft
    • java
    • Oracle
    • Contact
    © 2025 Theme Designed by Şevket Ayaksız.

    Type above and press Enter to search. Press Esc to cancel.