Close Menu
Şevket Ayaksız

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Why I Switched From iPhone Hotspot to a 5G Travel Router for Good

    Nisan 18, 2026

    Apple AirTags Revisited After 5 Years: How They Stack Up Today

    Nisan 18, 2026

    Verizon Offers Free iPad or Apple Watch With New iPhone Purchase: Here’s How It Works

    Nisan 18, 2026
    Facebook X (Twitter) Instagram
    • software
    • Gadgets
    Facebook X (Twitter) Instagram
    Şevket AyaksızŞevket Ayaksız
    Subscribe
    • Home
    • Technology

      Why I Switched From iPhone Hotspot to a 5G Travel Router for Good

      Nisan 18, 2026

      Verizon Offers Free iPad or Apple Watch With New iPhone Purchase: Here’s How It Works

      Nisan 18, 2026

      How to Use AI Safely at Work: 4 Practical Tips

      Nisan 18, 2026

      Turn an Old Tablet into a Smart Home Control Hub

      Nisan 18, 2026

      Gemini Mac App Tested: Key Edge Over Web Version

      Nisan 18, 2026
    • Adobe
    • Microsoft
    • java
    • Oracle
    Şevket Ayaksız
    Anasayfa » Undermining Security: Hackers’ Uncomplicated Approach to SEC’s X Account through SIM Swapping
    Tech

    Undermining Security: Hackers’ Uncomplicated Approach to SEC’s X Account through SIM Swapping

    By ayaksızOcak 26, 2024Yorum yapılmamış3 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Immediately after the exchange closed on January 9, the U.S. Securities and Exchange Commission published that it had approved exchange-traded funds, or ETFs, containing the cryptocurrency Bitcoin in X (née Twitter).

    There was just one problem: The SEC never issued this announcement; someone else did it.

    Fifteen minutes after the fake post was published, agency president Gary Gensler shared that the agency had not actually approved the listing. “The @SECGov Twitter account was hacked,” he wrote, “and an unauthorized tweet was sent.”

    This revealed an obvious problem: global crypto markets trade 24/7, and this announcement clearly moved the needle. In the minutes following the unauthorized post, the Bitcoin price rose more than 4% and lost more than it gained after the SEC declared it fraudulent. The SEC began working with federal law enforcement to investigate how such a hack could have occurred. Finally, earlier this week the regulator announced on January 22 that they were considering how the breach occurred. As it turned out, the agency fell victim to a frighteningly simple scam.

    The SEC was targeted with a SIM swap in which an attacker gained access to the phone number linked to the Twitter account, reset the password for account X, and then gained carte blanche to publish whatever they wanted. To do this, attackers must first figure out which phone number is tied to the account, contact that person’s phone service provider, and persuade that provider to reassign that number to a different device, experts told Fast Company.

    “Just like you can call your phone service provider and say, ‘I dropped my phone in the toilet, I need a new phone,’ an attacker can do anything you can do during that phone call,” says Rachel Tobac. CEO of SocialProof Security.

    The SEC made the simple mistake of turning off multi-factor authentication months before the attack because its staff had difficulty sharing access with the security measure on. It’s unclear whether the agency used text message-based authentication or app-based authentication, but the latter method, which experts think is more secure, could have prevented them from losing access to the account. There are also dedicated password managers and tools for companies to securely share passwords and multi-factor authentication codes.

    Tobac says the flaw in X’s system is that it allows users to link a phone number and even requires a phone number for accounts that want to be verified. X also allows users to reset their passwords by sending a text message to their phone number; But Tobac says it’s much safer to initiate these changes through an email account that’s harder to hack. As for whether there is a way for X to catch such violations, Tobac says there is nothing to catch. “If they encourage you to add your phone number and then let you change your phone number’s password, there’s nothing to catch because that’s expected behavior,” she says.

    Katie Moussouris, founder and CEO of Luta Security, said SIM swapping attacks will continue until mobile phone operators change the way they operate or are forced to do so with stronger rules and regulations.

    “We should never have allowed organizations to authenticate through a technology that is as easily intercepted as text messages,” says Moussouris. “Until mobile phone operators are forced through regulation to make SIM swapping more difficult for attackers, we will see these attacks continue for years to come.”

    Post Views: 304
    SIM technology Twitter
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    ayaksız
    • Website

    Related Posts

    Why I Switched From iPhone Hotspot to a 5G Travel Router for Good

    Nisan 18, 2026

    Verizon Offers Free iPad or Apple Watch With New iPhone Purchase: Here’s How It Works

    Nisan 18, 2026

    How to Use AI Safely at Work: 4 Practical Tips

    Nisan 18, 2026
    Add A Comment

    Comments are closed.

    Editors Picks
    8.5

    Apple Planning Big Mac Redesign and Half-Sized Old Mac

    Ocak 5, 2021

    Autonomous Driving Startup Attracts Chinese Investor

    Ocak 5, 2021

    Onboard Cameras Allow Disabled Quadcopters to Fly

    Ocak 5, 2021
    Top Reviews
    9.1

    Review: T-Mobile Winning 5G Race Around the World

    By sevketayaksiz
    8.9

    Samsung Galaxy S21 Ultra Review: the New King of Android Phones

    By sevketayaksiz
    8.9

    Xiaomi Mi 10: New Variant with Snapdragon 870 Review

    By sevketayaksiz
    Advertisement
    Demo
    Şevket Ayaksız
    Facebook X (Twitter) Instagram YouTube
    • Home
    • Adobe
    • microsoft
    • java
    • Oracle
    • Contact
    © 2026 Theme Designed by Şevket Ayaksız.

    Type above and press Enter to search. Press Esc to cancel.