SEC X Account's Alleged Hacker Arrested Over Fake Bitcoin ETF Post

Gold bitcoins on a computer motherboard

Prosecutors say Council gained access to the SEC account using a so-called SIM swap, which is when hackers fraudulently activate a victim’s phone number on a different device in order to intercept their phone calls and messages. This allows hackers to receive multi-factor authentication codes when trying to reset a victim’s email, social media or cryptocurrency exchange account.

The SEC hack allegedly began on Jan. 9, when co-conspirators using encrypted text messages sent Council the victim’s personal identifying information, as well as a template for the victim’s identification card. Council allegedly used an identity card printer to create a fake ID for the victim, according to the indictment.

With the fake ID in hand, Council allegedly traveled to an AT&T store in Huntsville, Alabama, to get a SIM card linked to the victim’s account. Council then walked to an Apple store to buy a new iPhone for the swap, according to the indictment.

As soon as access to the victim’s phone was granted, the co-conspirators generated access codes to the victim’s social media accounts and shared them with additional co-conspirators, according to the indictment.

The fake post was issued by one of the unnamed co-conspirators, according to the indictment. Once that was done, Council allegedly drove to a service provider’s store in Birmingham, Alabama, to return the iPhone for cash.

Council, whose online pseudonyms include @Easymunny, is scheduled to appear at a detention hearing on Oct. 22 in federal court in Huntsville, Alabama. He’s being represented in the matter by a federal public defender, Kevin Butler, who didn’t immediately respond to a message seeking comment.

See also  Fee-Based Advisors Face Demand for More Services: Franklin Templeton CEO

Copyright 2024 Bloomberg. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.