Twitter Hacker Goes To Jail

A British man who hacked famous Twitter accounts as part of a Bitcoin scam has been jailed in the US he has been involved in hacking schemes targeting crypto-currency wallets, Twitter accounts, and other social media accounts.

Joseph O'Connor, from Liverpool, took control more than 130 Twitter accounts in July 2020. The victims  included Barack Obama, Joe Biden, Jeff Bezos, Mike Bloomberg, Bill Gates and Elon Musk.

The 24-year-old hacker pleaded guilty to the charges of conspiracy to commit computer intrusions, wire fraud, and money laundering, computer intrusion, extortion, stalking, and making threats in May. He pleaded guilty to various charges, including SIM swapping attacks resulting in the theft of $794,000 worth of crypto-currency and participating in a scheme targeting high-profile Twitter accounts. 

As part of the attack, the perpetrator took over the phone numbers of three executives at the victim company to gain access to accounts and computers and steal crypto-currency from wallets maintained on behalf of two clients.

O’Connor also used SIM swapping to access unauthorised accounts on TikTok and Snapchat and engaged in stalking and swatting activities. He has now been sentenced to a five years prison sentence for cyber crimes, and ordered to pay forfeiture of $794,000, according to the US Attorney's Office in the southern district of New York. 
This hacking attack was part of a major Bitcoin scam that generated tweets asking followers to send Bitcoin to an account, promising to double their money.

As a result of the fraud, an estimated 350 million Twitter users viewed suspicious tweets from official accounts of some of the platform's biggest users, including Apple, Uber, Kanye West and Bill Gates. Thousands were duped into believing that a crypto giveaway was real.

O'Connor, who named himself PlugwalkJoe, was arrested 2 years ago and has been extradited from Spain to the US in April 2023 and in May he pleaded guilty to hacking charges that carried a total maximum sentence of more than 70 years. Three other men have been charged over the scam, with US teenager Graham Clark pleading guilty to his part in the deception in 2021.

The hackers telephoned a small number of Twitter employees with a believable tale to convince them to hand over their internal login details, which eventually granted them access to Twitter's administrative tools. They managed to use social engineering tricks, more akin to conmen than high-level cyber-criminals, with the aim to get access to the powerful internal control panel at the site.

In a statement, US Assistant Attorney-General Kenneth Polite Jr described O'Connor's actions as "flagrant and malicious", saying he had "harassed, threatened and extorted his victims, causing substantial emotional harm".
The US justice department also said O'Connor admitted other hacking crimes including gaining access to a high-profile TikTok account and stalking a minor.

The attacks, which unfolded over the course of several hours in July 2020, rocked Twitter and prompted the company to take the unprecedented measure of stopping all verified accounts from tweeting. He has been ordered to pay almost $800,000 in forfeiture, the US justice department said.

US Dept. of Justice:      BBC:      Oodaloop:    Security Week:     Daily Mail:    Liverpool World:    Guardian

Image: Umanoide on Unsplash

You Might Also Read: 

For Sale: 5.4m Twitter Users’ Data:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« A Brief History Of Artificial Intelligence & Its Potential Future
Financial Services Cyber Compliance Is About To Get Harder »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NQA Certification

NQA Certification

NQA provides certification to a range of ISO standards including ISO 27001 for information security management.

MarQuest

MarQuest

MarQuest provides services and systems to enhance network reliability and security.

CERT.AZ

CERT.AZ

The national Cyber Security Center of the Republic of Azerbaijan.

Advenica

Advenica

Advenica develops, manufactures and sells innovative cybersecurity solutions for encryption and secure information exchange.

Cellebrite

Cellebrite

Cellebrite delivers comprehensive solutions for mobile data forensics and mobile lifecycle management.

Foresite

Foresite

Foresite is a global service provider, delivering a range of managed security and consulting solutions.

ngCERT

ngCERT

ngCERT is the National Computer Emergency Response Team for Nigeria.

Infosec Partners

Infosec Partners

Whether you’re looking for complete managed security or an on-call expert advisor, we offer a range of managed security services to complement your internal team or primary outsource partner.

Com Laude

Com Laude

Com Laude is a domain name management company that provides strategic consulting to help companies strengthen digital brand, safeguard customers & protect brand IP.

Dell Technologies Capital

Dell Technologies Capital

At Dell Technologies Capital we lead investment in disruptive, early-stage startups in enterprise and cloud infrastructure.

CoverWallet

CoverWallet

CoverWallet combines deep analytics, thoughtful design and state of the art technology to help small businesses with all their insurance needs including Cyber Liability.

Adyta

Adyta

Adyta specializes in cybersecurity solutions adapted to the needs of sovereign institutions, business groups and other organizations that handle information and sensitive or classified data.

SecureThings

SecureThings

SecureThings focus is to provide guidance and technology to secure connected vehicles in order to build end-to-end security for the automotive industry.

xMatters

xMatters

xMatters is a digital service availability platform that helps enterprises prevent, manage, and resolve IT incidents before they can become business problems.

Shorebreak Security

Shorebreak Security

Shorebreak Securioty specialize in conducting highly accurate, safe, and reliable Information Security tests to determine the risks posed to your business.

Concourse Labs

Concourse Labs

Concourse Labs Security Guardrails continuously verify cloud infrastructure and workloads. Continuously assess clouds for security, resiliency, and regulatory compliance.

Xmirror Security

Xmirror Security

Xmirror Security focuses on integrated detection and defense of the continuous threat to the DevSecops software supply-chain with artificial intelligence technology as the core.

Paragon Cyber Solutions

Paragon Cyber Solutions

Paragon Cyber Solutions provides specialized security risk management and IT solutions to protect the integrity of your business operations.