Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • “PlugWalkJoe” indicted for $784K SIM swap cryptocurrency theft
  • Cyber Attacks
  • Data Breach

“PlugWalkJoe” indicted for $784K SIM swap cryptocurrency theft

4 years ago Graham Cluley
“PlugWalkJoe” indicted for $784K SIM swap cryptocurrency theft

The U.S. Department of Justice charged a British man for his alleged role in stealing $784,000 worth of cryptocurrency using SIM swap attacks.

According to the unsealed indictment, Joseph James O’Connor – also known as “PlugWalkJoe” – conspired with others to steal approximately $784,000 worth of cryptocurrency from a Manhattan-based cryptocurrency company.

It’s alleged that O’Connor, who is in his early twenties, perpetrated a scheme with unnamed co-conspirators to hijack control of three phone numbers belonging to executives of the targeted firm.

O’Connor and his associates are accused of pulling off a SIM-swap attack, which typically see fraudsters successfully dupe a cellphone provider’s customer support into giving them control of someone else’s phone number.

If a SIM-swap attack is successful, a fraudster will not just receive phone calls intended for their victim. They may also receive one-time passwords and 2FA codes used by some online services to authenticate whether a user is allowed to log into a system or not.

The Justice Department claims that after a successful SIM-swap attack, O’Connor and others managed to gain unauthorized access to staff accounts at the company and its computer systems.

On or about May 1, 2019, it is alleged that O’Connor and his cohorts then diverted the cryptocurrency held by the targeted company on behalf of two of its clients into cryptocurrency wallets under their own control.

The group allegedly stole a total of 770.784869 Bitcoin cash, 6,363.490509 Litecoin, 407.396074 Ethereum, and 7.456728 Bitcoin.

If the name “PlugWalkJoe” is familiar to you, then that may be because O’Connor was arrested earlier this year in relation to July 2020’s huge hack of celebrity Twitter accounts, a scheme which attempted to trick followers of the likes of Joe Biden, Kanye West, and Elon Musk into falling for a cryptocurrency scam.

In the aftermath of that high profile security breach, O’Connor showed a surprising willingness to confirm that he was “PlugWalkJoe,” telling the New York Times in July 2020 that he was not worried about police investigating his activities:

“I don’t care. They can come arrest me. I would laugh at them. I haven’t done anything.”

A selfie of Joseph James O'Connor, aka "PlugWalkJoe"

O’Connor is currently awaiting extradition from Spain, where he was apprehended earlier this year. He could face a lengthy prison sentence if convicted of the various criminal charges brought against him.


Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” “PlugWalkJoe” indicted for $784K SIM swap cryptocurrency theft” appeared first on TripWire

Source:TripWire – Graham Cluley

Tags: Encryption, Goverment, High Severity, Sim, TripWire

Continue Reading

Previous Critical Linux Kernel Bug Allows Remote Takeover
Next Free Discord Nitro Offer Used to Steal Steam Credentials

More Stories

  • Cyber Attacks
  • Data Breach
  • Malware

Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions

3 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog

3 hours ago [email protected] (The Hacker News)
  • Data Breach

[Webinar] The Smarter SOC Blueprint: Learn What to Build, Buy, and Automate

19 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package

19 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Data Breach

When Cloud Outages Ripple Across the Internet

22 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks

24 hours ago [email protected] (The Hacker News)

Recent Posts

  • Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions
  • CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog
  • http://thehackernews.com/2026/02/docker-fixes-critical-ask-gordon-ai.html
  • [Webinar] The Smarter SOC Blueprint: Learn What to Build, Buy, and Automate
  • Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT