Does the SEC Deserve to Regulate Crypto if it Can’t Even Secure a Twitter Account?

Does the SEC Deserve to Regulate Crypto if it Can’t Even Secure a Twitter Account?

1 minute, 25 seconds Read

The U.S. Securities and Exchange Commission suffered an humiliating security lapse on January 10th when its authorities Twitter account was hacked. The hackers published a falsified tweet revealing that the company had authorized a Bitcoin exchange-traded fund (ETF). This news triggered the rate of Bitcoin to momentarily spike almost $2,000 before the SEC provided explanations that the info was incorrect.


Keypoints

  • The authorities SEC Twitter account was hacked and published a incorrect tweet declaring a Bitcoin ETF was authorized, triggering the Bitcoin rate to briefly rise.
  • The SEC lateron validated the account hadactually been “compromised” and that they have not really authorized any Bitcoin ETFs.
  • The breach tookplace since the hacker acquired gainaccessto to a phone number connected to the SEC account, not because of a breach within Twitter’s systems.
  • The SEC account did not have two-factor authentication madeitpossiblefor at the time.
  • Politicians haveactually slammed the lax security steps and are requiring the SEC supply an description and examination into the occurrence.

The unapproved tweet declared “The SEC grants approval for #Bitcoin ETFs” to be noted on all signedup nationwide securities exchanges. This long-awaited news rightaway pressed the rate of Bitcoin from $46,730 up to almost $48,000. However, SEC Chairman Gary Gensler quickly published that the company’s account hadactually been “compromised” and that no Bitcoin ETF has infact been authorized.

The
The “Hacked” Tweet

Following this rejection, Bitcoin’s rate rapidly dropped back down to the $45,000 level. The SEC lateron gainedback control of its Twitter account and erased the phony tweet.

An examination by Twitter’s security group discovered that the breach was made possible since the SEC’s account did not have two-factor authentication allowed. Instead, the hackers got gainaccessto by taking control of a

Read More.

Similar Posts