chief security officer
  • macropolicy
  • Industrial Development
  • CSO·Insight
  • Threat intelligence
  • Data Security
  • privacy protection
  • Cloud security
  • en_USEN
    • de_DEDE
    • ru_RURU
    • zh_CNCN
    • zh_TWTW
    • jaJP
    • ko_KRKR
Sign in Sign up
Creation Center
  1. chief security officerHome
  2. intelligence gathering

X (formerly twitter) security team confirms theft of SEC account

chief security officer • January 11, 2024 at 7:42 pm • intelligence gathering • 9884 views

The U.S. Securities and Exchange Commission compromised the X (formerly twitter) account after unidentified individuals took control of the X (formerly twitter) account cell phone number. Approval for the Bitcoin ETF to be listed on all registered national stock exchanges was posted through the account, which did not have two-factor authentication enabled at the time of the theft.The X security team recommends that all users enable two-factor authentication to secure their accounts.

The SEC posted on its X (formerly twitter) account on Tuesday that the agency has "approved the listing of bitcoin ETFs on all registered national securities exchanges" and that "approved bitcoin ETFs will be subject to ongoing oversight and compliance measures to ensure continued investment "protection."

X (formerly twitter) security team confirms theft of SEC account

The post received more than 35,000 likes and more than 26,000 retweets in just 18 minutes before it was deleted, and SEC Chairman Gary Gensler later declared that the agency's accounts had been hacked via X Explained.

Company X's security team today confirmed that its Twitter account @SECGov has been compromised. The company has completed its initial investigation and determined that the compromise was not due to a breach of its systems, but rather to an unidentified individual taking control of X-related phone numbers. @SECGov via a third-party account.

X (formerly twitter) security team confirms theft of SEC account

Company X can also confirm that the account was not enabled at the time of the thefttwo-factor authentication. Two-factor authentication is an extra strong account security measure that helps protect accounts from unauthorized access.

Company X encourages all users to enable two-factor authentication. For more information on how to do this, please visit Company X's Help Center: https://help.x.com/en/safety-and-security/account-security-tips

leakparticulars

According to Company X's investigation, unidentified individuals were able to take control of the phone numbers associated with X. @SECGov through a third party account. This allowed them to reset the account's password and gain access to the account.

The account did not have two-factor authentication enabled at the time of the theft. Two-factor authentication requires the user to provide two different authentication factors in order to log into the account. This typically includes a username, password, and a one-time code from a cell phone or other security device.

Response from Company X

Company X has taken steps to protect its systems from future attacks. The company has also updated its security policy to require two-factor authentication (2FA) to be enabled for all accounts.

Users' recommendations

Company X encourages all users to take steps to protect theirAccount Security. This includes:

  • Use strong passwords and change them regularly
  • Enable two-factor authentication
  • Monitor their account activity and note any anomalies

Users may also take the following measures to protect their personal information:

  • Be cautious about sharing personal information
  • Use a secure browser andcyber securityhardware
  • Keep your operating system and software up to date

Original article by Chief Security Officer, if reproduced, please credit https://www.cncso.com/en/us-sec-twitter-account-hacked.html

2FA Security VerificationSEC account theft Twitter securitytwo-factor authenticationAccount Securitycell phone number hijackingleakloopholescyber securityhacking attack
Like (0)
0 0
Generate poster

About the author

chief security officer

chief security officer

126 posts
4 comments
1 questions
3 answers
5 followers
Chief Security Officer (cncso.com)
Windows & Edge Browser Patch:Microsoft Security Update Fixes 48 New Vulnerabilities
Previous January 10, 2024 9:30 pm
Five years of safe operation practice summary and future thinking
Next January 12, 2024 at 9:25 pm

related suggestion

  • Offense for Defense: Ransomware Attacks in Action Safe operation

    Offense for Defense: Ransomware Attacks in Action

    013.6K00
    xbear xbear
    January 6, 2024
  • Bandook RAT Variant Targets Windows System Security Attacks intelligence gathering

    Bandook RAT Variant Targets Windows System Security Attacks

    09.4K00
    chief security officer chief security officer
    January 5, 2024
  • Danish Energy Ministry Cyber Attack Not Linked to Sandworm Hacking Group intelligence gathering

    Danish Energy Ministry Cyber Attack Not Linked to Sandworm Hacking Group

    09.3K00
    chief security officer chief security officer
    January 15, 2024
  • AIGC Artificial Intelligence Safety Report 2024 Industrial Development

    AIGC Artificial Intelligence Safety Report 2024

    024.0K00
    chief security officer chief security officer
    March 2, 2024
  • "Volt Typhoon" III - Decoding the U.S. Government's Implementation of Cyber Espionage and Disinformation Operations CSO·Insight

    "Volt Typhoon" III - Decoding the U.S. Government's Implementation of Cyber Espionage and Disinformation Operations

    014.6K02
    chief security officer chief security officer
    October 18, 2024
  • Multiple High-Risk Security Vulnerabilities Found in Rapid SCADA Open Source Industrial Automation Platform intelligence gathering

    Multiple High-Risk Security Vulnerabilities Found in Rapid SCADA Open Source Industrial Automation Platform

    010.6K00
    chief security officer chief security officer
    January 22, 2024
chief security officer
chief security officer
chief security officer

Chief Security Officer (cncso.com)

126 posts
4 comments
1 questions
3 answers
5 followers

Recent Posts

  • CSO:2025年中国网络安全从合规到AI驱动风险治理趋势
  • Data Security Intelligence Body: AI-driven paradigm for next-generation enterprise data security protection
  • AI Security:Artificial Intelligence AI Attack Surface Analysis Report 2026
  • Global Cyber Attack Landscape and AI Security Threat Report 2025
  • AI Security: Building an Enterprise AI Security System Based on ATT&CK Methodology
  • AI IDE Security: Cursor Windsurf Google Antigravity Supply Chain Attack Analysis
  • CSO:2025 Artificial Intelligence (AI) Cyber Attack and Defense Statistics, Trends, Costs, and Defense Security Report
  • CSO: A Chief Security Officer's Guide to Full-Link Security for Artificial Intelligence Data
  • The MCP Governance Framework: How to build a next-generation security model that resists AI superpowers
  • AI security architecture: from AI capabilities to security platform landing practice

Recommended reading

  • CSO:2025年中国网络安全从合规到AI驱动风险治理趋势

    CSO:2025年中国网络安全从合规到AI驱动风险治理趋势

    2026年1月18日

  • Data Security Intelligence Body: AI-driven paradigm for next-generation enterprise data security protection

    Data Security Intelligence Body: AI-driven paradigm for next-generation enterprise data security protection

    January 13, 2026

  • AI Security:Artificial Intelligence AI Attack Surface Analysis Report 2026

    AI Security:Artificial Intelligence AI Attack Surface Analysis Report 2026

    January 10, 2026

  • Global Cyber Attack Landscape and AI Security Threat Report 2025

    Global Cyber Attack Landscape and AI Security Threat Report 2025

    January 9, 2026

  • AI Security: Building an Enterprise AI Security System Based on ATT&CK Methodology

    AI Security: Building an Enterprise AI Security System Based on ATT&CK Methodology

    January 9, 2026

  • AI IDE Security: Cursor Windsurf Google Antigravity Supply Chain Attack Analysis

    AI IDE Security: Cursor Windsurf Google Antigravity Supply Chain Attack Analysis

    January 7, 2026

  • Large model security: open source framework Guardrails security fence introduction and analysis

    Large model security: open source framework Guardrails security fence introduction and analysis

    January 6, 2026

  • CSO:2025 Artificial Intelligence (AI) Cyber Attack and Defense Statistics, Trends, Costs, and Defense Security Report

    CSO:2025 Artificial Intelligence (AI) Cyber Attack and Defense Statistics, Trends, Costs, and Defense Security Report

    January 4, 2026

  • CSO: A Chief Security Officer's Guide to Full-Link Security for Artificial Intelligence Data

    CSO: A Chief Security Officer's Guide to Full-Link Security for Artificial Intelligence Data

    December 31, 2025

  • The MCP Governance Framework: How to build a next-generation security model that resists AI superpowers

    The MCP Governance Framework: How to build a next-generation security model that resists AI superpowers

    December 30, 2025

chief security officer
  • fig. beginning
  • My Account
  • Creation Center
  • Privacy Policy
  • safe community
  • about Us
  • Sitemap

Copyright © 2020 Chief Security Officer. All Rights Reserved.
浙ICP备2023041448号 | Zhejiang Public Network Security No. 33011002017423