DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices

Posted on May 16, 2025 by Dissent

There’s an update to a previously reported case from the Department of Justice:

WASHINGTON – An Alabama man was sentenced today to 14 months in prison and three years of supervised release for his role in the unauthorized takeover of the U.S. Securities and Exchange Commission’s (SEC) social media account on X, formerly known as Twitter.

Eric Council Jr., 26, of Huntsville, pleaded guilty to conspiracy to commit aggravated identity theft and access device fraud in February. According to court documents, Council conspired with others to take control of the SEC’s X account and falsely announce that the SEC approved Bitcoin (BTC) Exchange Traded Funds (ETFs), a decision highly anticipated by the market. Immediately following the false announcement, the price of BTC increased by more than $1,000 per BTC. Following the correction, the value of BTC decreased by more than $2,000 per BTC.

The conspirators gained control of the SEC’s X account through an unauthorized Subscriber Identity Module (SIM) swap carried out by Council. A SIM swap is a form of sophisticated fraud where a criminal actor fraudulently induces a cellular phone carrier to reassign a cellular phone number from a victim’s SIM card to a SIM card controlled by the criminal actor, in order to access a victim’s social media or virtual currency accounts. As part of the scheme, Council used an identification card printer to create a fraudulent identification card with a victim’s personally identifiable information obtained from co-conspirators. Council used the identification card to impersonate the victim and gain access to the victim’s phone number for the purpose of accessing the SEC’s X account. Council’s co-conspirators then posted in the name of the SEC Chairman, falsely announcing the BTC ETF approval. Council received payment in BTC from co-conspirators for his role.

“Council and his co-conspirators used sophisticated cyber means to compromise the SEC’s X account and posted a false announcement that distorted important financial markets,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “Prosecuting those who seek to enrich themselves by threatening the integrity of digital assets through fraud is critical to protecting U.S. interests. The Department of Justice is committed to holding accountable individuals who commit cyber fraud and harm investors.”

“Schemes of this nature threaten the health and integrity of our market system,” said U.S. Attorney Jeanine Pirro for the District of Columbia. “SIM swap schemes threaten the financial security of average citizens, financial institutions, and government agencies. Don’t fool yourself into thinking you can’t be caught. You will be caught, prosecuted, and will pay the price for the damage your actions create.”

“The deliberate takeover of a federal agency’s official communications platform was a calculated criminal act meant to deceive the public and manipulate financial markets,” said FBI Criminal Investigative Division Acting Assistant Director Darren Cox. “By spreading false information to influence the markets, Council attempted to erode public trust and exploit the financial system. Today’s sentencing makes clear that anyone who abuses public platforms for criminal gain will be held accountable.”

“Today’s sentencing exemplifies SEC OIG’s commitment to holding bad actors accountable and maintaining the integrity of SEC programs and operations through thorough investigative oversight,” said Securities and Exchange Commission Office of Inspector General Special Agent in Charge Amanda James. “We are committed to working with the SEC and other law enforcement partners to help the SEC effectively and efficiently deliver on its critical mission.”

The FBI Washington Field Office and SEC Office of Inspector General investigated the case.

Trial Attorney Ashley Pungello of the Criminal Division’s Computer Crime and Intellectual Property Section, Trial Attorney Lauren Archer of the Criminal Division’s Fraud Section, and Assistant U.S. Attorney Kevin Rosenberg for the District of Columbia are prosecuting the case. Substantial assistance was provided by Cyber Fellow Paul M. Zebb III.

For more information on SIM swapping and how to prevent it, visit www.ic3.gov/PSA/2024/PSA240411.

Updated May 16, 2025

Source:  Department of Justice, Office of Public Affairs

Category: HackMiscellaneous

Post navigation

← Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices
  • Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations
  • Breachforums Boss “Pompompurin” to Pay $700k in Healthcare Breach
  • HHS Office for Civil Rights Settles HIPAA Cybersecurity Investigation with Vision Upright MRI
  • Additional 12 Defendants Charged in RICO Conspiracy for over $263 Million Cryptocurrency Thefts, Money Laundering, Home Break-Ins
  • RIBridges firewall worked. But forensic report says hundreds of alarms went unnoticed by Deloitte.
  • Chinese Hackers Hit Drone Sector in Supply Chain Attacks
  • Coinbase says hackers bribed staff to steal customer data and are demanding $20 million ransom
  • $28 million in Texas’ cybersecurity funding for schools left unspent
  • Cybersecurity incident at Central Point School District 6

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law
  • CFPB Quietly Kills Rule to Shield Americans From Data Brokers
  • South Korea fines Temu for data protection violations
  • The BR Privacy & Security Download: May 2025
  • License Plate Reader Company Flock Is Building a Massive People Lookup Tool, Leak Shows
  • FTC dismisses privacy concerns in Google breakup

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.