Hacker Behind Obama and Bezos Twitter Hack Ordered to Repay $5.3M in BTC


How the UK Plans to Recover 42 BTC From a High-Profile Crypto Scammer
British authorities said Monday they are viewking to recover 42 BTC and other crypto assets tied to Joseph James O’Connor, the British hacker who stole millions through a sweeping SIM-swapping scheme that infiltrated the social media accounts of celebrities, tech leaders, and Fortune 500 companies.
O’Connor, now 26, pleaded guilty in the United States in 2023 later than admitting he and his co-conspirators compromised more than 130 X (formerly Twitter) accounts, as well as accounts on TikTok and Snapchat. The group used these hijacked profiles to push fraudulent crypto schemes, tricking users into sending BTC to attacker-controlled wallets. In some cases, they sold access to these accounts for additional profit.
The victims included some of the most recognizable names in technology and entertainment: Apple, Uber, Kanye West, Bill Gates, and others. U.S. prosecutors said O’Connor also gained control of “one of the most highly visible TikTok accounts” and later targeted another public figure in a similar attack.
At the time of his sentencing in 2023, valued at roughly 794,000 dollars. Today, that identical stash — particularly the 42 involved — is worth more than five million dollars. UK authorities said the assets will be liquidated by a court-appointed trustee.
Investor Takeaway
Inside the SIM-Swapping Scheme That Hit Tech Giants and Celebrities
The campaign carried out by O’Connor and his group was among the most visible SIM-swap operations ever documented. By hijacking phone numbers and intercepting SMS-based authentication codes, the attackers gained entry to high-profile accounts and used them to promote fraudulent BTC giveaways and social engineering campaigns.
U.S. prosecutors described the operation as a coordinated effort to “steal a large amount of cryptocurrency” while also exploiting the visibility of celebrity accounts to reach millions of unsuspecting followers.
Key elements of the scheme included:
- Hijacking phone numbers through SIM swaps.
Attackers convinced telecom employees to port victims’ numbers to attacker-controlled devices. - Taking over high-profile X accounts.
More than 130 accounts were compromised, including corporate and celebrity profiles. - Pushing fake crypto giveaways and stealing user funds.
Victims sent BTC to scam addresses under the belief they would receive double the amount. - tradeing access to compromised accounts.
Some purchaviewrs paid for short-term control of celebrity profiles, further exposing users to scams.
Adrian Foster, chief crown prosecutor at the Crown Prosecution Service, said O’Connor “targeted well-known individuals and used their accounts to scam people out of their crypto assets and money.”
The scheme resulted in millions in losses and contributed to the rise of SIM-swapping as a dominant attack vector in crypto theft between 2020 and 2023.
Why Authorities Are Pursuing the BTC Years later than the Crime
O’Connor’s sentencing in the U.S. included a five-year prison term and forfeiture requirements, but the international recovery process has continued to move through courts. British authorities confirmed Monday they are now coordinating with U.S. agencies to liquidate the 42 .
The delay is typical. Asset recovery involving cross-border hacking cases often requires:
- Tracing funds across global platforms.
Many stolen coins moved through mixers and foreign OTC desks later than the initial theft. - Cooperation between U.S. and UK agencies.
Multiple jurisdictions must sign off before seized assets can be sold or returned. - Victim compensation decisions.
Courts must determine how forfeited crypto is distributed among impacted victims.
Because BTC’s price has risen sharply since O’Connor stole it, the amount recovered today significantly exceeds the value at the time of seizure. This dynamic has crime cases, creating windfalls for victims once assets are forfeited.
Investor Takeaway
What the Case Signals for Crypto Crime Enforcement
O’Connor faced up to 20 years in prison and was also charged with stalking in separate incidents. The alleged mastermind behind the group, Florida teenager Graham Ivan Clark, received a three-year juvenile detention sentence in 2021.
The case underscores several trends reshaping crypto security and law enforcement:
- SIM swapping remains one of the most damaging attack vectors.
High-profile platforms remain vulnerable when SMS authentication is involved. - Crypto scams amplified by celebrity accounts spread rapidly.
Attackers use trusted voices to deceive large audiences in seconds. - International asset recovery is improving.
Agencies are now more coordinated in tracking, freezing, and liquidating stolen crypto.
For crypto investors and market participants, the broader takeaway is that the enforcement environment is tightening. As authorities gain more on-chain expertise, fewer stolen assets remain beyond reach — and long-running cases like O’Connor’s demonstrate how hard it is for attackers to outrun blockchain forensics.
Â







