Jan. 23, 2024, 8:05 p.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news

Two weeks after its Twitter account was compromised, the SEC has confirmed that the threat actors behind the hack were likely able to obtain control of the cell phone number associated with the SEC account through a SIM swapping attack.


Attackers use SIM swapping to transfer phone numbers to another device without authorization, allowing them to receive voice and SMS communications associated with that number and effectively enabling them to reset passwords or bypass two-factor authentication (if targets rely on …

account account compromise attack attackers cell phone compromise compromised control device hack led numbers phone phone number phone numbers sec sim sim swapping sim swapping attack threat threat actors transfer twitter

Principal Security Engineer

@ Elsevier | Home based-Georgia

Infrastructure Compliance Engineer

@ NVIDIA | US, CA, Santa Clara

Information Systems Security Engineer (ISSE) / Cybersecurity SME

@ Green Cell Consulting | Twentynine Palms, CA, United States

Sales Security Analyst

@ Everbridge | Bengaluru

Alternance – Analyste Threat Intelligence – Cybersécurité - Île-de-France

@ Sopra Steria | Courbevoie, France

Third Party Cyber Risk Analyst

@ Chubb | Philippines