Friday, June 6, 2025
Peril Of Africa
  • Login
  • Home
  • News
    • Africa
    • Crime
    • Health
  • Politics
  • Opinions
  • Business
  • Lifestyle
No Result
View All Result
  • Home
  • News
    • Africa
    • Crime
    • Health
  • Politics
  • Opinions
  • Business
  • Lifestyle
No Result
View All Result
Peril Of Africa
No Result
View All Result

How to Stop Your X Account From Getting Hacked Like the SEC’s

by admin
January 14, 2024
in Technology
Share on FacebookWhatsAppTweetShare

By WIRED

Source link

This week, the United States Securities and Exchange Commission (SEC) suffered an embarrassing—and market-moving—breach in which a hacker gained access to its X social media account and published fake information about a highly anticipated SEC announcement related to bitcoin. The agency regained control of its account and deleted the post in under an hour, but the situation is troubling, especially given that the prominent and well-respected security firm Mandiant, which is owned by Google, had its X account compromised in a similar incident last week.

Details are still emerging about exactly what happened in each case, but there are common threads that made the account takeovers possible—and there are ways to protect yourself.

Crucially, both accounts had the digital protection known as “two-factor authentication” disabled at the time of the takeovers. Also known as 2FA, the defense requires a rotating numeric code or physical dongle in addition to a person’s login credentials, so everything isn’t resting on just a username and password. The SEC has not yet said whether it had two-factor turned off accidentally as a result of X’s February 2023 policy change, which made it so only accounts paying for a Blue subscription would have access to two-factor codes sent via text message. Mandiant implied on Wednesday that this change was the reason it did not have the protection turned on for its X account, saying, “Normally, 2FA would have mitigated this, but due to some team transitions and a change in X’s 2FA policy, we were not adequately protected.”

Mandiant said hackers were able to guess the password protecting its X account in “a brute force” attack. X itself said on Tuesday that the SEC account hack was the result of “an unidentified individual obtaining control over a phone number associated with the @SECGov account through a third party.”

The two incidents lay out a punch list of the most important steps you can take to lock down your X account. First, ensure that your account is protected by a strong, unique password. Second, turn on two-factor for your account or, if you think you already have it on, check to make sure. X’s move to make people pay for a basic form of two-factor is problematic. It also created confusion because the company prompted free users to switch away from SMS two-factor, but then seemingly simply turned off the protection altogether for those who didn’t. This likely left a group of users in a situation where they think they have two-factor authentication on, but actually don’t.

To confirm that you have two-factor on, or to enable it for the first time, log into your X account, go to Settings and privacy, then Security and account access, Security, and then Two-factor authentication. (You can also click here if you’re already logged into X). On that screen, you can choose between using two-factor authentication with a code-generating app or a physical security key. You can also generate backup codes for your account to log in to X even if you lose access to your second factor.

Finally, check that there isn’t a phone number linked to your X account that can be used for account recovery. Twitter uses phone numbers to “verify” high-profile accounts and also offers a feature called “Additional password protection,” through which “you must provide either the phone number or email address associated with your account in order to reset your password.” It seems, though, that by having a phone number associated with its X account, the SEC was putting itself at greater risk, because attackers could gain control of the account by first taking over the associated phone number using an attack known as a SIM swap.

“Remove your phone number from Twitter altogether to ensure you avoid the SIM-swap threat with Twitter’s risky text-message-based password reset flow,” says Rachel Tobac, a longtime account compromise researcher and CEO of SocialProof Security. She adds that X users should “turn on 2FA—I recommend app-based at the very least—and ensure you have a strong password on the account.”

Though X has made it more convoluted to enable strong account security, it’s worth learning from the SEC and Mandiant’s mistakes.

Related Posts

Apple CEO Tim Cook laughs with President Donald Trump during a meeting in the White House, Washington, March 6, 2019.
Leah Millis | Reuters
Featured

High Price of Tariffs & Isolation – Trump’s Tech Policies Are Bad Economics

May 24, 2025
Despite their immense financial success, MTN and Airtel have consistently failed to provide full transparency in their mobile money services. Image maybe subject to copyright.
Africa

MTN, Airtel: Telecom Giants Exploiting East African Consumers

February 5, 2025
The UCC should focus on making telecom services accessible, affordable, and efficient, not creating hurdles that serve no purpose other than to frustrate and exploit the people.  Image maybe subject to copyright.
Featured

The Uganda Communications Commission’s SIM Card Policy: A Digital Dictatorship

December 10, 2024
Next Post

Beni : une année après l’incendie, les activités reprennent au marché de Mayangose

Discussion about this post

Contacts

Email: [email protected]
Phone: +1 506-871-6371

© 2021 Peril of Africa

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • News
    • Africa
    • Crime
    • Health
  • Politics
  • Opinions
  • Business
  • Lifestyle

© 2021 Peril of Africa