DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices

Posted on May 16, 2025 by Dissent

There’s an update to a previously reported case from the Department of Justice:

WASHINGTON – An Alabama man was sentenced today to 14 months in prison and three years of supervised release for his role in the unauthorized takeover of the U.S. Securities and Exchange Commission’s (SEC) social media account on X, formerly known as Twitter.

Eric Council Jr., 26, of Huntsville, pleaded guilty to conspiracy to commit aggravated identity theft and access device fraud in February. According to court documents, Council conspired with others to take control of the SEC’s X account and falsely announce that the SEC approved Bitcoin (BTC) Exchange Traded Funds (ETFs), a decision highly anticipated by the market. Immediately following the false announcement, the price of BTC increased by more than $1,000 per BTC. Following the correction, the value of BTC decreased by more than $2,000 per BTC.

The conspirators gained control of the SEC’s X account through an unauthorized Subscriber Identity Module (SIM) swap carried out by Council. A SIM swap is a form of sophisticated fraud where a criminal actor fraudulently induces a cellular phone carrier to reassign a cellular phone number from a victim’s SIM card to a SIM card controlled by the criminal actor, in order to access a victim’s social media or virtual currency accounts. As part of the scheme, Council used an identification card printer to create a fraudulent identification card with a victim’s personally identifiable information obtained from co-conspirators. Council used the identification card to impersonate the victim and gain access to the victim’s phone number for the purpose of accessing the SEC’s X account. Council’s co-conspirators then posted in the name of the SEC Chairman, falsely announcing the BTC ETF approval. Council received payment in BTC from co-conspirators for his role.

“Council and his co-conspirators used sophisticated cyber means to compromise the SEC’s X account and posted a false announcement that distorted important financial markets,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “Prosecuting those who seek to enrich themselves by threatening the integrity of digital assets through fraud is critical to protecting U.S. interests. The Department of Justice is committed to holding accountable individuals who commit cyber fraud and harm investors.”

“Schemes of this nature threaten the health and integrity of our market system,” said U.S. Attorney Jeanine Pirro for the District of Columbia. “SIM swap schemes threaten the financial security of average citizens, financial institutions, and government agencies. Don’t fool yourself into thinking you can’t be caught. You will be caught, prosecuted, and will pay the price for the damage your actions create.”

“The deliberate takeover of a federal agency’s official communications platform was a calculated criminal act meant to deceive the public and manipulate financial markets,” said FBI Criminal Investigative Division Acting Assistant Director Darren Cox. “By spreading false information to influence the markets, Council attempted to erode public trust and exploit the financial system. Today’s sentencing makes clear that anyone who abuses public platforms for criminal gain will be held accountable.”

“Today’s sentencing exemplifies SEC OIG’s commitment to holding bad actors accountable and maintaining the integrity of SEC programs and operations through thorough investigative oversight,” said Securities and Exchange Commission Office of Inspector General Special Agent in Charge Amanda James. “We are committed to working with the SEC and other law enforcement partners to help the SEC effectively and efficiently deliver on its critical mission.”

The FBI Washington Field Office and SEC Office of Inspector General investigated the case.

Trial Attorney Ashley Pungello of the Criminal Division’s Computer Crime and Intellectual Property Section, Trial Attorney Lauren Archer of the Criminal Division’s Fraud Section, and Assistant U.S. Attorney Kevin Rosenberg for the District of Columbia are prosecuting the case. Substantial assistance was provided by Cyber Fellow Paul M. Zebb III.

For more information on SIM swapping and how to prevent it, visit www.ic3.gov/PSA/2024/PSA240411.

Updated May 16, 2025

Source:  Department of Justice, Office of Public Affairs


Related:

  • Hackers Say They Have Personal Data of Thousands of NSA and Other Government Officials
  • John Bolton Indictment Provides Interesting Details About Hack of His AOL Account and Extortion Attempt
  • UK: 'Catastrophic' attack as Russians hack files on EIGHT MoD bases and post them on the dark web
  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
  • No Kings. Not Today. Not Ever.
  • Data BreachesProsper Data Breach Impacts 17.6 Million Accounts
Category: HackMiscellaneous

Post navigation

← Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations
Australian national known as “DR32” sentenced in U.S. federal court (1) →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Once a Patient’s in Custody, ICE Can Be at Hospital Bedsides — But Detainees Have Rights
  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.