SIM swapping: the simple way that hackers took over the SEC’s X Account

Just after the stock market closed on January 9, the U.S. Securities and Exchange Commission posted on X (née Twitter) that it had approved exchange-traded funds, or ETFs, that included the cryptocurrency bitcoin. It was a massively important, potentially market-moving announcement, and one that was hotly anticipated by crypto fanatics, professional traders, and casual investors alike.

There was only one problem: The SEC never posted that announcement—someone else did.

Fifteen minutes after the false post went up, agency chair Gary Gensler posted that the agency had not in fact approved the listing. “The @SECGov Twitter account was compromised,” he wrote, “and an unauthorized tweet was posted.”

This presented an obvious problem (never mind the fact that the SEC actually did approve bitcoin ETFs a mere two days after the hack): the global crypto markets trade 24/7 and this announcement clearly moved the needle. The price of bitcoin shot up more than 4% in the minutes following the unauthorized post and lost even more than it gained after the SEC clarified it was fraudulent. The SEC, for its part, went right to work alongside federal law enforcement to investigate how such a hack could occur. Finally, earlier this week, the regulator disclosed on January 22 how they think the breach transpired. As it turns out, the agency fell victim to a frighteningly uncomplicated scam.

The SEC was targeted by a SIM swap, whereby an attacker—or group or perpetrators—gained access to the phone number linked to the Twitter account, reset the X account’s password, and then gained carte blanche to post whatever they pleased. In order to do this, experts tell Fast Company, the attackers needed to first figure out what phone number was linked to the account, contact that person’s phone service provider, and convince that provider to reassign that number to a different device.

“Just like you can call up your telephone service provider and say, ‘Hey I dropped my phone in the toilet, I need a new phone,’ anything you can do on that phone call an attacker can do as well,” says Rachel Tobac, the CEO of SocialProof Security.

The SEC made a simple error months before the attack, turning off multifactor authentication because its staff had difficulty sharing access with the security precaution turned on. It’s not clear whether the agency used text-message-based authentication or app-based authentication (such as Google Authenticator), but the latter method—which experts consider more secure—could have prevented them from losing access to the account. There are also special password managers and tools for companies to securely share passwords and multifactor-authentication codes.

Tobac says the flaw in X’s system is that it allows users to link a phone number—and even requires a phone number for accounts that want to be verified. X also allows users to reset their passwords through a text message to their phone number, though Tobac says initiating these changes through an email account, which are harder to hack, is a much more secure method. As to whether there’s any way for X to catch these kinds of breaches, Tobac says there’s nothing to catch. “If they encourage you to add your phone number, and then allow you to change your password to your phone number, there’s nothing to catch—because that’s an expected behavior,” she says.

Katie Moussouris, the founder and CEO of Luta Security, said that SIM swap attacks will continue happening until mobile phone carriers change how they operate—or are forced to do so with stronger rules and regulations.

“We should never have let organizations build authentication on a technology as easily hijacked as text messages,” Moussouris says. “Until mobile phone carriers are forced via regulation to make SIM swapping hard for attackers, we will see these attacks persist for years to come.”

https://www.fastcompany.com/91017079/the-simple-way-that-hackers-took-over-the-secs-x-account?partner=rss&utm_source=rss&utm_medium=feed&utm_campaign=rss+fastcompany&utm_content=rss

Vytvořeno 2y | 26. 1. 2024 9:40:05


Chcete-li přidat komentář, přihlaste se

Ostatní příspěvky v této skupině

Smarter AI is supercharging battery innovation 

The global race for better batteries has never been more intense. Electric vehicles, drones, and next-generation aircraft all depend on high-performance energy storage—yet the traditiona

24. 8. 2025 11:40:14 | Fast company - tech
AI passed the aesthetic Turing Test, raising big questions for art

Pick up an August 2025 issue of Vogue, and you’ll come across an advertisement for the brand Guess featur

24. 8. 2025 9:20:14 | Fast company - tech
This word-search website is the brain boost you never knew you needed

Language is the original technology, the tool we’ve all used to coordinate with each other for thousands of years. Our success in life—both professionally and in relationships—depends on it.

24. 8. 2025 0:10:13 | Fast company - tech
Dropbox Passwords is shutting down. Do this before your passwords are deleted for good

It’s been a bad year for password managers. First, Microsoft announced earlier this summer that its popular Microsoft Authenticator app would be

23. 8. 2025 10:10:09 | Fast company - tech
The TikTok dorm water panic is officially here

Instead of worrying about making friends or keeping up with their studies, new college students have a different concern on their minds: dorm water.

“Praying dorm water doesn’t ruin my h

22. 8. 2025 20:20:07 | Fast company - tech
Reddit—and a dash of AI—do what Google and ChatGPT can’t

Hello, everyone, and thanks once again for reading Fast Company’s Plugged In.

For years, some of the world’s most

22. 8. 2025 20:20:06 | Fast company - tech