In a case that attracted global attention, a British hacker, Joseph O’Connor, who infamously took control of numerous high-profile X (formerly Twitter) accounts in 2020, now faces new legal consequences beyond his ongoing imprisonment in the United States. The 26-year-old has been compelled by UK authorities to forfeit £4.1 million ($5.4 million) in cryptocurrency. The move by the Crown Prosecution Service (CPS) highlights the intensifying crackdown on cybercriminals benefiting from ill-gotten digital assets. People interested in digital security have closely followed O’Connor’s case, which serves as a reminder of the risks tied to even the most widely-used technology platforms.
Joseph O’Connor’s name has circulated widely in cybersecurity circles ever since the 2020 incident. At that time, O’Connor accessed over 130 accounts, including those of Apple, Uber, Elon Musk, Bill Gates, Barack Obama, and Kanye West, to perpetrate a Bitcoin scam promising to double users’ funds. Reports from earlier investigations noted that social engineering techniques enabled O’Connor and his associates to acquire internal Twitter login credentials, revealing how employee manipulation can bypass digital safeguards. Recent details confirm that the total Bitcoin raised in these scams—initially worth about $110,000—has since appreciated due to market fluctuations, underscoring that the financial impact of cybercrimes can increase with time.
What Led to O’Connor’s Crypto Seizure?
The CPS’s asset recovery followed a lengthy effort to trace O’Connor’s proceeds from the illegal Twitter account takeovers and related cryptocurrency fraud. A total of 42 Bitcoin and other digital assets were recovered. This sum represents funds acquired not only through the high-profile Twitter scam, but also from other activities uncovered by investigators. The CPS found O’Connor worked together with individuals he met via the online game Call of Duty, broadening the scope of the criminal network involved.
How Did the Social Engineering Attack Happen?
O’Connor and his fellow hackers used social engineering, a tactic focused on manipulating people rather than technology, to access Twitter’s internal systems. After convincing several Twitter employees to give up their credentials, the group gained control of key administrative tools. This access enabled them to hijack notable accounts and promote their fraudulent Bitcoin doubling scheme, exposing over 350 million users to the scam.
What Has Been the Response From Authorities?
The administrative response has involved both the U.S. and U.K. justice systems. O’Connor is currently serving a five-year sentence in the United States. The CPS’s recent focus has been on asset forfeiture, targeting proceeds believed to extend beyond the Twitter hack.
“Even when someone is not convicted in the UK, we are still able to ensure they do not benefit from their criminality,”
said Adrian Foster from the CPS Proceeds of Crime Division.
“Asset recovery sends a strong message to those who believe they can profit from online crime,”
he added, stressing the commitment to financial investigation.
While Joseph O’Connor’s use of social engineering instead of technical hacking is not unprecedented, the magnitude of his targets and the subsequent digital asset forfeiture amplify the significance of the case. Cases like this are increasingly common as cryptocurrency values rise, making digital theft potentially more lucrative over time. The collaboration between international agencies also shows that legal and financial tools can be leveraged across borders, even when direct prosecution isn’t feasible in every jurisdiction. To protect digital assets, companies are urged to reinforce employee training and regularly audit administrative access protocols. Asset recovery initiatives such as this case are likely to grow as part of broader efforts to deter cybercrime, and individuals should remain skeptical of too-good-to-be-true offers online—especially involving digital wallets and cryptocurrency transactions.
