Diamond Member Pelican Press 0 Posted March 14 Diamond Member Share Posted March 14 SEC bitcoin hack was result of SIM-swapping A cyber ******* against the US Securities and Exchange Commission (SEC) that resulted in misinformation being posted on the financial regulator’s social media channels was the result of a SIM-swapping *******, it has emerged. The ******* came to light on Monday 9 January when the SEC’s X account briefly appeared to confirm that the regulator had approved the creation of US-listed exchange-traded funds (ETFs) for the bitcoin cryptocurrency. The SEC has since officially This is the hidden content, please Sign In or Sign Up in a landmark moment for crypto assets. However, in jumping the ****, its attackers caused significant fluctuations in the market before the post was removed and the SEC retook control of the hijacked account. In the intervening fortnight, the SEC has been working with law enforcement and other bodies, including the FBI, the Cybersecurity and Infrastructure Security Agency (CISA), the Department of Justice (DoJ) and its own internal enforcement teams. In an update, an SEC spokesperson confirmed that the hackers obtained control of the mobile phone number linked to the compromised X account via SIM-swapping. “Access to the phone number occurred via the telecom carrier, not via SEC systems. SEC staff have not identified any evidence that the unauthorised party gained access to SEC systems, data, devices, or other social media accounts,” said the spokesperson. “Once in control of the phone number, the unauthorised party reset the password for the @SECGov account. Among other things, law enforcement is currently investigating how the unauthorised party got the carrier to change the SIM for the account and how the party knew which phone number was associated with the account. “While multifactor authentication (MFA) had previously been enabled on the @SECGov X account, it was disabled by X support, at the staff’s request, in July 2023 due to issues accessing the account. Once access was re-established, MFA remained disabled until staff re-enabled it after the account was compromised on 9 January. MFA currently is enabled for all SEC social media accounts that offer it,” they added. What is SIM-swapping? A successful This is the hidden content, please Sign In or Sign Up occurs when a threat actor is able to convince the mobile network operator (MNO) to switch the victim’s mobile number to a new device. This is generally achieved through phishing against the victim to obtain data such as personally identifiable information (PII), credentials and answers to security questions (mother’s maiden name, make and model of first car, and so on). They can then contact the MNO and register a new SIM card to the victim’s account, taking it over and gaining access to any call or SMS data, or accounts that may be linked to the victim’s phone number. Because many online accounts, from banking to social media, rely on mobile authentication to retrieve or reset their credentials, the attackers can then take complete control of their victim’s digital life, emptying bank accounts or co-opting their social media. Unfortunately, all too often, the victim will be unaware they have been targeted until their mobile device suddenly stops being able to send or receive calls or texts, at which point it is too late. Ordinary people can take steps to safeguard themselves against this ******* vector. Historically, the most effective method has been held to be utilising MFA across key accounts – though even this is not infallible, particularly if it relies on SMS one-time passcodes. More effective is to use authenticator apps from the likes of This is the hidden content, please Sign In or Sign Up or This is the hidden content, please Sign In or Sign Up . Most effective is not to link a mobile phone number to online accounts if it can be avoided. In the SEC’s case, the ******* appears to have been limited to pranking or trolling crypto enthusiasts, but nevertheless, manipulating financial markets in this way is ********, and if the culprits are caught and found to be in the US – or a country with which the US shares an extradition treaty – they can expect stiff penalties. Ilia Kolochenko, a cyber ****** educator and founder and chief executive of This is the hidden content, please Sign In or Sign Up , said the incident could have been a lot worse. “While the SEC’s X account hack is a minor security incident, all governmental agencies should review the security of their social network accounts,” he said. “A breach of the SEC account can cause market volatility for a short time, however, a message on X by the US Department of Defense announcing war or a nuclear strike could trigger unpredictable and devastating consequences globally.” This is the hidden content, please Sign In or Sign Up #SEC #bitcoin #hack #result #SIMswapping This is the hidden content, please Sign In or Sign Up Link to comment https://hopzone.eu/forums/topic/2856-sec-bitcoin-hack-was-result-of-sim-swapping/ Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now