chief security officer
  • fig. beginning
  • macropolicy
  • Industrial Development
  • CSO·Insight
  • Threat intelligence
  • Data Security
  • privacy protection
  • Cloud security
  • EN
    • CN
    • DE
    • RU
    • TW
    • JP
    • KR
Sign in Sign up
Creation Center
  1. chief security officerHome
  2. intelligence gathering

X (formerly twitter) security team confirms theft of SEC account

chief security officer • January 11, 2024 at 7:42 pm • intelligence gathering • 11271 views

The U.S. Securities and Exchange Commission compromised the X (formerly twitter) account after unidentified individuals took control of the X (formerly twitter) account cell phone number. Approval for the Bitcoin ETF to be listed on all registered national stock exchanges was posted through the account, which did not have two-factor authentication enabled at the time of the theft.The X security team recommends that all users enable two-factor authentication to secure their accounts.

The SEC posted on its X (formerly twitter) account on Tuesday that the agency has "approved the listing of bitcoin ETFs on all registered national securities exchanges" and that "approved bitcoin ETFs will be subject to ongoing oversight and compliance measures to ensure continued investment "protection."

X (formerly twitter) security team confirms theft of SEC account

The post received more than 35,000 likes and more than 26,000 retweets in just 18 minutes before it was deleted, and SEC Chairman Gary Gensler later declared that the agency's accounts had been hacked via X Explained.

Company X's security team today confirmed that its Twitter account @SECGov has been compromised. The company has completed its initial investigation and determined that the compromise was not due to a breach of its systems, but rather to an unidentified individual taking control of X-related phone numbers. @SECGov via a third-party account.

X (formerly twitter) security team confirms theft of SEC account

Company X can also confirm that the account was not enabled at the time of the thefttwo-factor authentication. Two-factor authentication is an extra strong account security measure that helps protect accounts from unauthorized access.

Company X encourages all users to enable two-factor authentication. For more information on how to do this, please visit Company X's Help Center: https://help.x.com/en/safety-and-security/account-security-tips

leakparticulars

According to Company X's investigation, unidentified individuals were able to take control of the phone numbers associated with X. @SECGov through a third party account. This allowed them to reset the account's password and gain access to the account.

The account did not have two-factor authentication enabled at the time of the theft. Two-factor authentication requires the user to provide two different authentication factors in order to log into the account. This typically includes a username, password, and a one-time code from a cell phone or other security device.

Response from Company X

Company X has taken steps to protect its systems from future attacks. The company has also updated its security policy to require two-factor authentication (2FA) to be enabled for all accounts.

Users' recommendations

Company X encourages all users to take steps to protect theirAccount Security. This includes:

  • Use strong passwords and change them regularly
  • Enable two-factor authentication
  • Monitor their account activity and note any anomalies

Users may also take the following measures to protect their personal information:

  • Be cautious about sharing personal information
  • Use a secure browser andcyber securityhardware
  • Keep your operating system and software up to date

Original article by Chief Security Officer, if reproduced, please credit https://www.cncso.com/en/us-sec-twitter-account-hacked.html

2FA Security VerificationSEC account theft Twitter securitytwo-factor authenticationAccount Securitycell phone number hijackingleakloopholescyber securityhacking attack
Like (0)
0 0
Generate poster

About the author

chief security officer

chief security officer

137 posts
4 comments
1 questions
3 answers
6 followers
Chief Security Officer (cncso.com)
Windows & Edge Browser Patch:Microsoft Security Update Fixes 48 New Vulnerabilities
Previous January 10, 2024 9:30 pm
Five years of safe operation practice summary and future thinking
Next January 12, 2024 at 9:25 pm

related suggestion

  • Turkish Hackers Exploit MS SQL Server Vulnerability in Cyber Attacks intelligence gathering

    Turkish Hackers Exploit MS SQL Server Vulnerability in Cyber Attacks

    012.5K00
    chief security officer chief security officer
    January 9, 2024
  • Russian APT28 Hacking Group Exploits NTLM Security Vulnerability to Attack High-Value Targets Worldwide intelligence gathering

    Russian APT28 Hacking Group Exploits NTLM Security Vulnerability to Attack High-Value Targets Worldwide

    011.0K00
    chief security officer chief security officer
    February 3, 2024
  • Practice and exploration of consumer personal information protection in takeaway business scenarios privacy protection

    Practice and exploration of consumer personal information protection in takeaway business scenarios

    227.1K219
    Liu Jing Liu Jing
    November 20, 2023
  • Danish Energy Ministry Cyber Attack Not Linked to Sandworm Hacking Group intelligence gathering

    Danish Energy Ministry Cyber Attack Not Linked to Sandworm Hacking Group

    010.7K00
    chief security officer chief security officer
    January 15, 2024
  • Interpretation of ATT&CK framework for network security attack and defense confrontation CSO·Insight

    Interpretation of ATT&CK framework for network security attack and defense confrontation

    020.4K00
    chief security officer chief security officer
    February 11, 2022
  • The Economics of Cybersecurity in Emerging Markets think tank report

    The Economics of Cybersecurity in Emerging Markets

    013.1K00
    chief security officer chief security officer
    March 1, 2025
chief security officer
chief security officer
chief security officer

Chief Security Officer (cncso.com)

137 posts
4 comments
1 questions
3 answers
6 followers

Popular Recommendations

  • Google Zero Trust Architecture Practice
    275.1K

    Google Zero Trust Architecture Practice

  • WPS Office for windows is dealing with a certain OLE mechanism remote code vulnerability

    WPS Office for windows is dealing with a certain OLE mechanism remote code vulnerability

    61.9K
  • StripChat adult video website vulnerability leaks sensitive data of tens of millions of users

    StripChat adult video website vulnerability leaks sensitive data of tens of millions of users

    52.5K
  • Alibaba Cloud Zero Trust Practice: Identity and Network Micro-Isolation in Production Networks

    Alibaba Cloud Zero Trust Practice: Identity and Network Micro-Isolation in Production Networks

    34.6K
  • Practice and exploration of consumer personal information protection in takeaway business scenarios

    Practice and exploration of consumer personal information protection in takeaway business scenarios

    27.1K
  • AIGC Artificial Intelligence Safety Report 2024

    AIGC Artificial Intelligence Safety Report 2024

    26.5K
  • Security Parallel: Next Generation Native Security Infrastructure

    Security Parallel: Next Generation Native Security Infrastructure

    24.8K
  • New secure infrastructure: Alibaba data asset blueprint

    New secure infrastructure: Alibaba data asset blueprint

    24.6K
  • [Critical] Remote code execution vulnerability in open source Apache Log4j

    [Critical] Remote code execution vulnerability in open source Apache Log4j

    22.2K
  • China's new development in the digital era, network security has entered a new era

    China's new development in the digital era, network security has entered a new era

    21.8K
chief security officer
  • fig. beginning
  • Creation Center
  • Privacy Policy
  • Personal center
  • about Us
  • Sitemap
  • CN
  • EN
  • DE

Copyright © 2020 Chief Security Officer. All Rights Reserved.
浙ICP备2023041448号 | Zhejiang Public Network Security No. 33011002017423