Twitter Hacker Goes To Jail

A British man who hacked famous Twitter accounts as part of a Bitcoin scam has been jailed in the US he has been involved in hacking schemes targeting crypto-currency wallets, Twitter accounts, and other social media accounts.

Joseph O'Connor, from Liverpool, took control more than 130 Twitter accounts in July 2020. The victims  included Barack Obama, Joe Biden, Jeff Bezos, Mike Bloomberg, Bill Gates and Elon Musk.

The 24-year-old hacker pleaded guilty to the charges of conspiracy to commit computer intrusions, wire fraud, and money laundering, computer intrusion, extortion, stalking, and making threats in May. He pleaded guilty to various charges, including SIM swapping attacks resulting in the theft of $794,000 worth of crypto-currency and participating in a scheme targeting high-profile Twitter accounts. 

As part of the attack, the perpetrator took over the phone numbers of three executives at the victim company to gain access to accounts and computers and steal crypto-currency from wallets maintained on behalf of two clients.

O’Connor also used SIM swapping to access unauthorised accounts on TikTok and Snapchat and engaged in stalking and swatting activities. He has now been sentenced to a five years prison sentence for cyber crimes, and ordered to pay forfeiture of $794,000, according to the US Attorney's Office in the southern district of New York. 
This hacking attack was part of a major Bitcoin scam that generated tweets asking followers to send Bitcoin to an account, promising to double their money.

As a result of the fraud, an estimated 350 million Twitter users viewed suspicious tweets from official accounts of some of the platform's biggest users, including Apple, Uber, Kanye West and Bill Gates. Thousands were duped into believing that a crypto giveaway was real.

O'Connor, who named himself PlugwalkJoe, was arrested 2 years ago and has been extradited from Spain to the US in April 2023 and in May he pleaded guilty to hacking charges that carried a total maximum sentence of more than 70 years. Three other men have been charged over the scam, with US teenager Graham Clark pleading guilty to his part in the deception in 2021.

The hackers telephoned a small number of Twitter employees with a believable tale to convince them to hand over their internal login details, which eventually granted them access to Twitter's administrative tools. They managed to use social engineering tricks, more akin to conmen than high-level cyber-criminals, with the aim to get access to the powerful internal control panel at the site.

In a statement, US Assistant Attorney-General Kenneth Polite Jr described O'Connor's actions as "flagrant and malicious", saying he had "harassed, threatened and extorted his victims, causing substantial emotional harm".
The US justice department also said O'Connor admitted other hacking crimes including gaining access to a high-profile TikTok account and stalking a minor.

The attacks, which unfolded over the course of several hours in July 2020, rocked Twitter and prompted the company to take the unprecedented measure of stopping all verified accounts from tweeting. He has been ordered to pay almost $800,000 in forfeiture, the US justice department said.

US Dept. of Justice:      BBC:      Oodaloop:    Security Week:     Daily Mail:    Liverpool World:    Guardian

Image: Umanoide on Unsplash

You Might Also Read: 

For Sale: 5.4m Twitter Users’ Data:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« A Brief History Of Artificial Intelligence & Its Potential Future
Financial Services Cyber Compliance Is About To Get Harder »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Varonis

Varonis

Varonis provide a security software platform to let organizations track, visualize, analyze and protect their unstructured data.

Arxan Technologies

Arxan Technologies

Arxan is a leader of application attack-prevention and self-protection products for Internet of Things (IoT), Mobile, Desktop, and other applications.

ISO Quality Services Ltd

ISO Quality Services Ltd

ISO Quality Services is an independent organisation that specialises in the implementation, certification and continued auditing of ISO and BS EN Management Standards including ISO 27001..

Ionic Security

Ionic Security

Ionic provide a high-assurance data protection and control platform built on strong encryption, fine-grain control and contextual analytics.

Cyber Threat Intelligence Network (CTIN)

Cyber Threat Intelligence Network (CTIN)

CTIN provides cyber threat intelligence services including training, platform evaluation, ISAC/ISAO systems development and counter botnet operations.

Magix Security

Magix Security

Magix Security assesses the cyber threat, gives you visibility of how vulnerable your business is to attack, and provides cybercrime detection and prevention services.

Xperien

Xperien

Xperien is a leading South African Information Technology Asset Disposition (ITAD) company.

IoT M2M Council (IMC)

IoT M2M Council (IMC)

The IMC is the largest and fastest-growing trade organisation in the IoT/M2M sector.

Crosspoint Capital Partners

Crosspoint Capital Partners

Crosspoint Capital Partners is a private equity investment firm focused on the cybersecurity and privacy sectors.

QGroup

QGroup

QGroup has been re-designing the consultancy industry since 2012. We're a rapidly expanding group of consulting companies that deliver bespoke IT services including cybersecurity.

Nomios

Nomios

Nomios develops innovative solutions for your security and network challenges. We design, secure and manage your digital infrastructure.

Krista Software

Krista Software

Krista is an intelligent automation platform that combines iPaaS and Conversational AI to automate complete business processes across your teams and apps.

Triangle

Triangle

Triangle enable innovative business transformation by ensuring critical hybrid infrastructures are optimised, interoperable and secure.

Framework Security

Framework Security

With Framework Security, you get more than a consultancy; you get a partner dedicated to simplifying cybersecurity and protecting your business in the most efficient way possible.

Oleria Security

Oleria Security

Oleria is the only adaptive and autonomous security solution that helps organizations accelerate at the pace of change, trusting that data is protected.

Ebryx

Ebryx

At Ebryx, we are at the forefront of cybersecurity innovation, leveraging over a decade of expertise to protect and empower organizations worldwide.