In 2017, Joseph O'Connor was charged with the crime of using his computer to hack into the Twitter accounts of multiple celebrities. Using a phishing attack, he was able to gain access to sensitive information and post messages without the celebrity's permission. This included posts that contained links to malicious software and webpages containing viruses.
He also used his access to send malicious messages in the names of celebrities, as well as posting defamatory content about them. In a subsequent investigation by Twitter, it was found that O'Connor had accessed more than 130 celebrity accounts and gained access to over 700 private messages from those accounts.
O'Connor's actions caused significant damage to Twitter's reputation and violated the company's terms of use. The company had to review its security protocols and take steps to ensure the safety of its users from future attacks. In addition, O'Connor's actions caused significant financial losses for celebrities whose accounts were hacked as well as diminished their public image due to the malicious messages posted on their behalf.
For his crime, O'Connor was sentenced to three years in prison and ordered to pay over $50,000 in restitution. This serves as an example that hackers who choose to illegally gain access to private information can and will face serious consequences for their actions. As a result of this case, many companies have tightened their security protocols, making it more difficult for hackers to gain access to protected information.
In conclusion, this case serves as a reminder that cybercrime is a serious offence and will be punished accordingly. It highlights the importance of internet security and protecting ourselves against malicious actors online. Companies must remain vigilant in their efforts to protect their user's data and ensure that it remains secure from hackers who would seek to exploit it for nefarious purposes. Here at Pentest People, we have the tools to eliminate the risk of a cyber attack to your business through a range of our Penetration Testing services.
Have a listen below at our consultants break down of this attack.