Twitter Hacker Goes To Jail

A British man who hacked famous Twitter accounts as part of a Bitcoin scam has been jailed in the US he has been involved in hacking schemes targeting crypto-currency wallets, Twitter accounts, and other social media accounts.

Joseph O'Connor, from Liverpool, took control more than 130 Twitter accounts in July 2020. The victims  included Barack Obama, Joe Biden, Jeff Bezos, Mike Bloomberg, Bill Gates and Elon Musk.

The 24-year-old hacker pleaded guilty to the charges of conspiracy to commit computer intrusions, wire fraud, and money laundering, computer intrusion, extortion, stalking, and making threats in May. He pleaded guilty to various charges, including SIM swapping attacks resulting in the theft of $794,000 worth of crypto-currency and participating in a scheme targeting high-profile Twitter accounts. 

As part of the attack, the perpetrator took over the phone numbers of three executives at the victim company to gain access to accounts and computers and steal crypto-currency from wallets maintained on behalf of two clients.

O’Connor also used SIM swapping to access unauthorised accounts on TikTok and Snapchat and engaged in stalking and swatting activities. He has now been sentenced to a five years prison sentence for cyber crimes, and ordered to pay forfeiture of $794,000, according to the US Attorney's Office in the southern district of New York. 
This hacking attack was part of a major Bitcoin scam that generated tweets asking followers to send Bitcoin to an account, promising to double their money.

As a result of the fraud, an estimated 350 million Twitter users viewed suspicious tweets from official accounts of some of the platform's biggest users, including Apple, Uber, Kanye West and Bill Gates. Thousands were duped into believing that a crypto giveaway was real.

O'Connor, who named himself PlugwalkJoe, was arrested 2 years ago and has been extradited from Spain to the US in April 2023 and in May he pleaded guilty to hacking charges that carried a total maximum sentence of more than 70 years. Three other men have been charged over the scam, with US teenager Graham Clark pleading guilty to his part in the deception in 2021.

The hackers telephoned a small number of Twitter employees with a believable tale to convince them to hand over their internal login details, which eventually granted them access to Twitter's administrative tools. They managed to use social engineering tricks, more akin to conmen than high-level cyber-criminals, with the aim to get access to the powerful internal control panel at the site.

In a statement, US Assistant Attorney-General Kenneth Polite Jr described O'Connor's actions as "flagrant and malicious", saying he had "harassed, threatened and extorted his victims, causing substantial emotional harm".
The US justice department also said O'Connor admitted other hacking crimes including gaining access to a high-profile TikTok account and stalking a minor.

The attacks, which unfolded over the course of several hours in July 2020, rocked Twitter and prompted the company to take the unprecedented measure of stopping all verified accounts from tweeting. He has been ordered to pay almost $800,000 in forfeiture, the US justice department said.

US Dept. of Justice:      BBC:      Oodaloop:    Security Week:     Daily Mail:    Liverpool World:    Guardian

Image: Umanoide on Unsplash

You Might Also Read: 

For Sale: 5.4m Twitter Users’ Data:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« A Brief History Of Artificial Intelligence & Its Potential Future
Financial Services Cyber Compliance Is About To Get Harder »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Nordic IT Security

Nordic IT Security

Nordic IT Security is a cyber security business forum in Scandinavia bringing together the converging worlds of IT, Cyber and Information Security.

Gate 15

Gate 15

Gate 15 provide risk management services focusing primarily on information, intelligence and threat analysis, operational support and preparedness.

Acutec

Acutec

Acutec is an award winning IT support, services and solutions provider including managed IT Security and backup/disaster recovery.

Bottomline Technologies

Bottomline Technologies

Bottomline Technologies is an innovator in business payment automation technology, helping companies make complex business payments simple, smart and secure.

Sqreen

Sqreen

Sqreen is a web application security monitoring and protection solution helping companies protect their apps and users from attacks.

SaferVPN

SaferVPN

SaferVPN is a Virtual Private Network services provider offering secure encrypted access to the internet.

Elliptic

Elliptic

Elliptic solve the crucial problem of identity in cryptocurrencies, with the sole purpose of combating suspicious and criminal activity.

United Biometrics

United Biometrics

United Biometrics is an anonymous and real-time authentication platform designed to stop the fraud for mobile payments, e-Commerce and applications.

CyberSec Hub - The Kosciuszko Institute

CyberSec Hub - The Kosciuszko Institute

The goal of CyberSec Hub is to create a centre of excellence for cybersecurity in Krakow, a new European “Cyber-Silicon Valley”.

Hyperwise Ventures

Hyperwise Ventures

Hyperwise Ventures lead seed investments in startups in the cyber security and enterprise software spaces.

ADGS

ADGS

ADGS is a deeptech company focused in the fields of Agent-Based simulations (Emergent Behavior), Cybersecurity and Biometrics, Social Dynamics, Natural Language Processing and Artificial Intelligence.

Cymptom

Cymptom

At Cymptom our purpose is to enable security managers to see at a glance all urgently risky gaps  in their organizations’ security posture at any given moment.

D.med Software

D.med Software

D.med Software is a company with a focus on cybersecurity for embedded software and cloud applications for the medical industry.

Global Resilience Federation (GRF)

Global Resilience Federation (GRF)

GRF builds, develops and connects security information sharing communities for mutual defense.

Ivolv Cybersecurity

Ivolv Cybersecurity

Ivolv is here to assist your organization in building effective protection and resilience against cyber attacks.

Tranchulus

Tranchulus

Tranchulus are a global provider of offensive and defensive cyber solutions, information security assessment, compliance and managed security services.