{"id":7252,"date":"2024-01-12T21:33:56","date_gmt":"2024-01-12T21:33:56","guid":{"rendered":"http:\/\/thisbiginfluence.com\/?p=7252"},"modified":"2024-01-12T21:33:56","modified_gmt":"2024-01-12T21:33:56","slug":"how-to-stop-your-x-account-from-getting-hacked-like-the-secs","status":"publish","type":"post","link":"https:\/\/thisbiginfluence.com\/?p=7252","title":{"rendered":"How to Stop Your X Account From Getting Hacked Like the SEC&#8217;s"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>This week, america Securities and Alternate Fee (SEC) suffered an embarrassing\u2014and <a href=\"https:\/\/www.wired.com\/story\/sec-x-account-hack-investigation\/\">market-moving<\/a>\u2014breach wherein a hacker <a href=\"https:\/\/www.wired.com\/story\/sec-x-account-compromise\/\">gained access to its X social media account<\/a> and printed faux details about a <a href=\"https:\/\/www.wired.com\/story\/spot-bitcoin-etfs-launch\/\">highly anticipated SEC announcement<\/a> associated to bitcoin. The company regained management of its account and deleted the submit in beneath an hour, however the state of affairs is troubling, particularly provided that the distinguished and well-respected safety agency Mandiant, which is owned by Google, had its X account compromised in an identical incident final week.<\/p>\n<p class=\"paywall\">Particulars are nonetheless rising about precisely what occurred in every case, however there are frequent threads that made the account takeovers potential\u2014and there are methods to guard your self.<\/p>\n<p class=\"paywall\">Crucially, each accounts had the digital safety generally known as \u201c<a href=\"https:\/\/www.wired.com\/story\/protect-accounts-two-factor-authentication\/\">two-factor authentication<\/a>\u201d disabled on the time of the takeovers. Also referred to as 2FA, the protection requires a rotating numeric code or bodily dongle along with an individual&#8217;s login credentials, so all the pieces is not resting on only a username and password. The SEC has not but stated whether or not it had two-factor turned off unintentionally because of <a href=\"https:\/\/www.wired.com\/story\/twitter-sms-2fa-twitter-blue\/\">X&#8217;s February 2023 policy change<\/a>, which made it so solely accounts paying for a Blue subscription would have entry to two-factor codes despatched through textual content message. Mandiant <a data-offer-url=\"https:\/\/twitter.com\/Mandiant\/status\/1745173897220432331\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/twitter.com\/Mandiant\/status\/1745173897220432331&quot;}\" href=\"https:\/\/twitter.com\/Mandiant\/status\/1745173897220432331\" rel=\"nofollow noopener\" target=\"_blank\">implied on Wednesday<\/a> that this variation was the rationale it didn&#8217;t have the safety turned on for its X account, saying, \u201cUsually, 2FA would have mitigated this, however as a result of some crew transitions and a change in X\u2019s 2FA coverage, we weren&#8217;t adequately protected.\u201d<\/p>\n<p class=\"paywall\">Mandiant stated hackers had been in a position to guess the password defending its X account in \u201ca brute power\u201d assault. X itself <a data-offer-url=\"https:\/\/twitter.com\/safety\/status\/1744924042681897343?s=46\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/twitter.com\/safety\/status\/1744924042681897343?s=46&quot;}\" href=\"https:\/\/twitter.com\/safety\/status\/1744924042681897343?s=46\" rel=\"nofollow noopener\" target=\"_blank\">said on Tuesday<\/a> that the SEC account hack was the results of \u201can unidentified particular person acquiring management over a telephone quantity related to the @SECGov account by means of a 3rd social gathering.\u201d<\/p>\n<p class=\"paywall\">The 2 incidents lay out a punch listing of crucial steps you possibly can take to <a href=\"https:\/\/www.wired.com\/story\/twitter-2fa-sms-alternatives-twitter-blue\/\">lock down your X account<\/a>. First, be sure that your account is protected by a robust, distinctive password. Second, activate two-factor on your account or, if you happen to suppose you have already got it on, test to ensure. X\u2019s transfer to make individuals pay for a primary type of two-factor is problematic. It additionally created confusion as a result of the corporate prompted free customers to modify away from SMS two-factor, however then seemingly merely turned off the safety altogether for many who didn\u2019t. This possible left a gaggle of customers in a state of affairs the place they suppose they&#8217;ve two-factor authentication on, however truly don\u2019t.<\/p>\n<p class=\"paywall\">To substantiate that you&#8217;ve got two-factor on, or to allow it for the primary time, log into your X account, go to <strong>Settings and privateness<\/strong>, then\u00a0<strong>Safety and account entry<\/strong>,\u00a0<strong>Safety<\/strong>, after which\u00a0<strong>Two-factor authentication<\/strong>. (You\u00a0also can <a data-offer-url=\"https:\/\/twitter.com\/settings\/account\/login_verification\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/twitter.com\/settings\/account\/login_verification&quot;}\" href=\"https:\/\/twitter.com\/settings\/account\/login_verification\" rel=\"nofollow noopener\" target=\"_blank\">click here if you&#8217;re already logged into X<\/a>). On that display, you possibly can select between utilizing two-factor authentication with a code-generating app or a bodily safety key. You may as well generate backup codes on your account to log in to X even if you happen to lose entry to your second issue.<\/p>\n<p class=\"paywall\">Lastly, test that there is not a telephone quantity linked to your X account that can be utilized for account restoration. Twitter makes use of telephone numbers to \u201cconfirm\u201d high-profile accounts and likewise gives a characteristic referred to as \u201cExtra password safety,\u201d by means of which \u201cyou could present both the telephone quantity or electronic mail deal with related together with your account with the intention to reset your password.\u201d It appears, although, that by having a telephone quantity related to its X account, the SEC was placing itself at larger danger, as a result of attackers may achieve management of the account by first taking up the related telephone quantity utilizing <a href=\"https:\/\/www.wired.com\/story\/sim-swap-attack-defend-phone\/\">an attack known as a SIM swap<\/a>.<\/p>\n<p class=\"paywall\">\u201cTake away your telephone quantity from Twitter altogether to make sure you keep away from the SIM-swap menace with Twitter&#8217;s dangerous text-message-based password reset stream,\u201d says Rachel Tobac, a longtime account compromise researcher and CEO of SocialProof Safety. She provides that X customers ought to \u201cactivate 2FA\u2014I like to recommend app-based on the very least\u2014and guarantee you have got a robust password on the account.&#8221;<\/p>\n<p class=\"paywall\">Although X has made it extra convoluted to allow sturdy account safety, it\u2019s price studying from the SEC and Mandiant\u2019s errors.<\/p>\n<\/div>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><br \/>\n<br \/><br \/>\n<br \/><a href=\"https:\/\/www.wired.com\/story\/sec-mandiant-x-two-factor-settings\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This week, america Securities and Alternate Fee (SEC) suffered an embarrassing\u2014and market-moving\u2014breach wherein a hacker gained access to its X social media account and printed faux details about a highly anticipated SEC announcement associated to bitcoin. The company regained management of its account and deleted the submit in beneath an hour, however the state of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7254,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[3827,3145,7010,721],"class_list":["post-7252","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","tag-account","tag-hacked","tag-secs","tag-stop"],"_links":{"self":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/7252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7252"}],"version-history":[{"count":0,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/7252\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/media\/7254"}],"wp:attachment":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7252"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7252"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}