Today, the SEC has confirmed that a cell phone account associated with the X account suffered a SIM-swapping attack.
"Two days after the incident, in consultation with the SEC's telecom carrier, the SEC determined that the unauthorized party obtained control of the SEC cell phone number associated with the account in an apparent 'SIM swap' attack," explains an updated SEC press statement on the breach.
The SEC also confirmed that multi-factor authentication was not enabled on the account, as they had asked X support to disable it when they encountered problems logging into the account.
If MFA was enabled via SMS, the hackers would still have been able to breach the account as they would have received the one-time passcodes.
However, if the security setting had been configured to use an authentication app, it would have prevented the threat actors from logging into the account, even after the attackers had changed the password.
For this reason, it is always advised that MFA only be used with a hardware security key or an authentication app rather than through SMS.