CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Wall Street building in New York City showing SEC's X account hack with approval of Bitcoin ETF
Cyber SecurityNews
·4 min read

Hack of SEC’s X Account Used to Prank the Crypto World With News of Bitcoin ETF Approval

Scott Ikeda·January 12, 2024

The cryptocurrency world has been anticipating the approval of Bitcoin ETFs by the Securities and Exchange Commission (SEC), something that finally happened just before the deadline on Wednesday. A group of hackers touched off premature celebration on Tuesday when they gained control of the SEC’s X account, using the unauthorized access to post a fake approval message.

X’s corporate safety team indicated that the hackers had gained access to a phone number tied to the SEC’s account through a “third party,” pointing to a likely SIM swap. The SEC reportedly also did not have two-factor authentication enabled at the time of the attack.

Hacked X account takes advantage of hotly anticipated crypto news

The crypto world has been abuzz with talk of a Bitcoin ETF, or SEC approval for certain investment companies to offer “spot bitcoin” exchange-traded funds. These are liquid funds that tie their value to the price of bitcoin by holding large amounts of it, providing investors a means to profit from crypto without actually holding any of it. The SEC had set January 10 as a deadline to reach a decision regarding the applications of 11 firms that sought to offer bitcoin ETFs; it ended up approving all of them, though the wait until the last minute to do so opened the door for hackers to have some fun first.

The fun only lasted for about 15 minutes. At a little after 4:00 PM on Tuesday, just after the markets had closed for the day in New York, the SEC X account posted what looked like authentic approval of bitcoin ETFs. The news spread like wildfire, sparking mass celebration from crypto exchanges. They would end up having to wait a day for the real party, however. Gary Gensler, chair of the SEC, was quick to post from his personal X account that the notification was bogus and that a hack had taken place.

Though there was only about 15 minutes of exposure, it was enough time for Reuters and several other media sources to put out stories covering the apparent Bitcoin ETF approval. Though there was an immediate spike in the value of bitcoin, hitting an increase of about $3,000 before the fake post was debunked, it ultimately fell about 3.15% after the air had cleared. The price would go up 0.3% the following day when the real announcement was made.

While it is possible the hacker was after a quick profit, the timing of the attack and the brief window points more to an odd prank than anything. That is an unusual application of a breach of the SEC’s X account, which could have been used for much more lucrative (and financially damaging) schemes.

According to Claude Mandy, Chief Evangelist, Data Security at Symmetry Systems: “Given this was solely on the social media platform along with a raft of highly respected security firms, I suspect it will be rapidly forgotten in the broader scheme of things. It does however reinforce the importance of security for public and private sector organizations, regardless of size and stature.”

X quick to disavow Bitcoin ETF incident

The SEC has reiterated that it will not break major market-impacting announcements like the Bitcoin ETF approval via its X account, and has said that the FBI has been contacted about the incident and is investigating. For its part X security was almost excessively forthcoming about what happened, almost seeming to be in a hurry to ensure blame was placed directly on the SEC for not properly securing its account. This may be due to its ongoing FTC order that requires it to address privacy and security issues, something that has already cost it hundreds of millions of dollars in prior violations.

The Bitcoin ETF debacle is also far from the first time a high profile X account has been captured and used to make a fraudulent announcement regarding crypto, and prior incidents have been more the direct fault of the company’s internal security. The biggest incident took place in 2020, when Elon Musk, Jeff Bezos and Barack Obama were among the public figures hit by a crypto scam. That incident turned out to stem from a security lapse that allowed attackers to social engineer their way into access to an administrative panel that essentially enabled them to take over any account on the platform.

X has also been struggling with a wave of crypto-related hacking that now dates back to late 2023. Earlier in the week, the X accounts of both Netgear and Hyundai were hacked and used to promote crypto scams. Leading security firm Mandiant also had its platform account hijacked for a similar scheme last week, even though it says that it had 2FA enabled.

The exact details of the Bitcoin ETF attack have yet to be released by any of the involved parties, but given what is known a SIM swap is a very reasonable assumption. SIM swapping has been on the rise as a criminal approach as of late, with three of the biggest for-profit hacking groups in the news making it a part of their toolkit: Lapsus$, Octo Tempest and Scattered Spider.

Darren James, a Senior Product Manager at Specops Software, notes that the SEC’s own new rules will likely prompt more detailed reporting in the near future: “Ironically, the SEC’s new breach reporting requirements should help us better understand what exactly took place from a forensic standpoint. It is difficult to say if the SEC X/Twitter account fell prey to stolen credentials, phishing, social engineering, etc. But, what is clear is that leaders need to be diligent in keeping tight controls on their data.”

Darren Guccione, CEO and Co-Founder at Keeper Security, points out that this is a reminder that  many organizations are continuing to lag behind in implementing MFA requirements: “Not all 2FA and MFA options are created equal, but some form of MFA is better than going without. MFA can protect against a variety of cyber-attack vectors including phishing, brute force and credential stuffing attacks. Traditional 2FA methods such as SMS are weaker than other methods like an authenticator app or hardware key. In fact, the National Institute of Standards and Technology (NIST) removed the use of SMS authentication from its recommended authentication methods list due to the potential vulnerabilities. A password manager can store MFA codes and autofill them, which provides a seamless experience for users by eliminating the second step, and protects against social engineering or SIM swapping attacks that can compromise codes sent via the weaker MFA methods such as email or SMS.”

 

Tags
Bitcoin ETFCryptoX Account
Scott Ikeda
Senior Correspondent at CPO Magazine
Scott Ikeda is a technology futurist and writer for more than 15 years. He travels extensively throughout Asia and writes about the impact of technology on the communities he visits. Over the last 5 years, Scott has grown increasingly focused on the future landscape of big data, surveillance, cybersecurity and the right to privacy.
Related
Finger on App Store icon showing crypto stealer malware
Cyber SecurityNews

First Crypto Stealer Malware on iOS App Store Steals Wallet Recovery Secrets and Passwords

February 14, 2025
Computer code on a screen with a skull showing crypto drainer malware
Cyber SecurityNews

$87 Million Lost to Crypto Drainer as Inferno Malware Fools Customers With Coinbase, Seaport Connection Protocols

January 18, 2024
Crypto coins hanging on clotheslines showing crypto laundering and Lazarus group
Cyber SecurityNews

Cross-Chain Crypto Laundering Spikes to $7 Billion, Lazarus Group Responsible for $900 Million

October 11, 2023
Fintech icons on technology background showing attack on DeFi projects and finance pools
Cyber SecurityNews

Rough Week for DeFi Projects With Attacks on Finance Pools, Rug Pulls Creating Massive Losses

August 8, 2023
Gold bitcoin in front of dollar bills showing crypto crimes
Cyber SecurityNews

Crypto Crimes Rake in a Record $20 Billion, but With Only Slight Gains in Overall Activity

January 16, 2023
Hacker hunting for crypto showing cyber attacks
Cyber SecurityInsights

Fighting Back: Emergent Technologies To Secure Crypto Firms Against Cyberattacks

July 4, 2022
Metamask Web3 wallets on mobile phone screen showing Chinese hackers
Cyber SecurityNews

Web3 Wallets Targeted by Chinese Hackers; “SeaFlower” Using Cloned Websites to Trick Crypto Traders

June 22, 2022
Binance mobile app on smartphone screen showing sharing of user data with Russian FSB
Data PrivacyNews

Report Says Text Messages Indicate Binance Shared User Data With Russian FSB

May 18, 2022

Latest

Keyboard with dollar bill showing ransom payment and cyber extortion

PowerSchool Confirms Ongoing Cyber Extortion of Individual Schools Despite Ransom Payment

Keyboard with red backlight showing LockBit ransomware data breach

LockBit Ransomware Suffers Its Own Data Breach, Internal Conversations With Victims Leaked

Mobile phone and lock icons showing messaging app security breach

High Security Messaging App Tool Used by US Government Suspends Service After Security Breach

TikTok logo on smartphone showing data transfers of EU data

TikTok to Receive €530 Million Fine Over EU Data Storage, Data Transfers to China

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources
Press Releases

© 2024 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    Data Breach U.S. Regulations Cyber Attack EU GDPR
    See all results