Skip to content
  Saturday 9 December 2023
  • Home
  • Cloud
  • Data
  • Cybersecurity
    • Attack
    • Malware
  • Technology
  • Home
  • Cloud
  • Data
  • Cybersecurity
    • Attack
    • Malware
  • Technology
Trending
November 7, 2023Critical Flaws Discovered in Veeam ONE IT Monitoring Software – Patch Now September 1, 2023How SMBs Can Cut Through the Generative AI Hype September 1, 2023‘Pure Speculation on Their Part’ August 17, 2023AI in XDR: When Does It Make Sense? July 25, 2023North Korean Nation-State Actors Exposed in JumpCloud Hack After OPSEC Blunder March 8, 2023Staying Ahead of Financial Crimes in the Age of Real-Time Payments November 16, 2022Advances In AI Help Marketers With Live Streaming Video Marketing August 31, 2023Facebook Links Massive Disinformation Operation to China August 4, 2022Robinhood’s Tenev says the retail brokerage firm is not interested in selling itself despite struggles September 6, 2023How a Secret Phishing Syndicate Targets 8,000+ Microsoft 365 Accounts
  • Home
  • Cloud
  • Data
  • Cybersecurity
    • Attack
    • Malware
  • Technology
  • Home
  • Cloud
  • Data
  • Cybersecurity
    • Attack
    • Malware
  • Technology
  Attack  Mastermind Behind Twitter 2020 Hack Pleads Guilty and Faces up to 70 Years in Prison
Attack

Mastermind Behind Twitter 2020 Hack Pleads Guilty and Faces up to 70 Years in Prison

adminadmin—May 10, 20230
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail


May 10, 2023Ravie LakshmananCyber Crime / Social Media

Twitter Hack

A U.K. national has pleaded guilty in connection with the July 2020 Twitter attack affecting numerous high-profile accounts and defrauding other users of the platform.

Joseph James O’Connor, who also went by the online alias PlugwalkJoe, admitted to “his role in cyberstalking and multiple schemes that involve computer hacking, including the July 2020 hack of Twitter,” the U.S. Department of Justice (DoJ) said.

The 23-year-old individual was extradited from Spain on April 26 after a Spanish National Court, in February, approved the DoJ request to hand over O’Connor to face 14 criminal charges in the U.S.

The massive hack, which took on July 15, 2020, involved O’Connor and his co-conspirators seizing control of 130 Twitter accounts, including those belonging to Barack Obama, Bill Gates, and Elon Musk, to perpetrate a cryptocurrency scam that netted them $120,000 in a few hours.

The attack was made possible by using social engineering techniques to obtain unauthorized access to backend tools used by Twitter, and subsequently leveraging that entry point to seize control of the accounts and, in some instances, sell the access to others. O’Connor himself is said to have purchased unauthorized access to one Twitter account for $10,000.

Cybersecurity

O’Connor is one of four individuals who have been charged with carrying out the Twitter hack. Nima Fazeli and Graham Ivan Clark were arrested that same month, while O’Connor was apprehended by Spanish authorities in the town of Estepona a year later in July 2021.

Mason Sheppard, according to BBC’s Joe Tidy, has not been arrested. Clark was awarded a three-year jail term after he pleaded guilty to 30 felony charges in March 2021.

More stories

Leveraging the Multi-Cloud to Combat Data Exfiltration

March 30, 2023

Hive Ransomware Hackers Begin Leaking Data Stolen from Tata Power Energy Company

October 25, 2022

Uber Claims No Sensitive Data Exposed in Latest Breach… But There’s More to This

September 17, 2022

This Hidden Facebook Tool Lets Users Remove Their Email or Phone Number Shared by Others

November 7, 2022

In addition to the Twitter incident, the defendant has been charged with computer intrusions related to takeovers of TikTok and Snapchat user accounts, as well as stalking a juvenile victim online.

This entailed orchestrating SIM swapping attacks against two unnamed victims to gain illicit access to their Snapchat and TikTok accounts, respectively, as well as making false emergency calls to law enforcement about a third victim, claiming that the part was “making threats to shoot people.”

SIM swapping occurs when fraudsters contact a telecom service provider under the guise of a victim to port the target’s mobile number to a SIM card under their control, resulting in the victim’s calls and messages being routed to a malicious unauthorized device controlled by the threat actors.

UPCOMING WEBINAR

Learn to Stop Ransomware with Real-Time Protection

Join our webinar and learn how to stop ransomware attacks in their tracks with real-time MFA and service account protection.

Save My Seat!

The miscreants then typically use control of the victim’s mobile phone number to take over bank accounts and other services held by the victim that are registered to the mobile phone number by taking advantage of call- or SMS-based two-factor authentication.

O’Connor and his co-conspirators have also been accused of employing SIM swapping techniques to siphon cryptocurrency to the tune of $794,000 from a New York City-based crypto company between March and May 2019.

“After stealing and fraudulently diverting the stolen cryptocurrency, O’Connor and his co-conspirators laundered it through dozens of transfers and transactions and exchanged some of it for Bitcoin using cryptocurrency exchange services,” the DoJ said.

“Ultimately, a portion of the stolen cryptocurrency was deposited into a cryptocurrency exchange account controlled by O’Connor.”

O’Connor, who has agreed to forfeit about $794,000 in stolen funds, is scheduled to be sentenced on June 23. The charges carry a total maximum penalty of over 70 years in prison.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

admin

U.S. Government Neutralizes Russia’s Most Sophisticated Snake Cyber Espionage Tool
Here’s why sodium-ion batteries are shaping up to be a big technology breakthrough
Related posts
  • Related posts
  • More from author
Attack

Researchers Unveal GuLoader Malware’s Latest Anti-Analysis Techniques

December 9, 20230
Attack

New 5G Modems Flaws Affect iOS Devices and Android Models from Major Brands

December 8, 20230
Attack

N. Korean Kimsuky Targeting South Korean Research Institutes with Backdoor Attacks

December 8, 20230
Load more
Whoops, it looks like you forgot to specify a form to display.
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Attack

Researchers Unveal GuLoader Malware’s Latest Anti-Analysis Techniques

December 9, 20230
Malware

Ugly Health Data Breach Trends in 2023

December 9, 20230
Malware

Europe Reaches Deal on AI Act, Marking a Regulatory First

December 9, 20230
Malware

Call for Cooperation at Black Hat Europe 2023

December 9, 20230
Malware

FBI to Evaluate Bids to Delay Reporting Cybersecurity Events

December 8, 20230
Malware

Feds Warn Health Sector to Watch for Open-Source Threats

December 8, 20230
Load more

Recent Posts

  • Researchers Unveal GuLoader Malware’s Latest Anti-Analysis Techniques
  • Ugly Health Data Breach Trends in 2023
  • Europe Reaches Deal on AI Act, Marking a Regulatory First
  • Call for Cooperation at Black Hat Europe 2023
  • FBI to Evaluate Bids to Delay Reporting Cybersecurity Events

    © Copyright 2023, All Rights Reserved