Skip to main content

Twitter hacking suspect

TAMPA, Fla. -- The online bond hearing for a Florida teen accused of hacking prominent Twitter accounts was interrupted Wednesday by rap music and pornographic videos from users who apparently disguised their names.

The interruptions — including one by a user who shared a screen and took over the hearing with a porn video — forced Hillsborough County Judge Christopher C. Nash to temporarily halt the session for Graham Ivan Clark, 17.

Nash reopened the hearing, but the users continued their disruptions. He ultimately declined to lower Clark's bail, which was set at $725,000 when he was arrested on Friday.

Prosecutors allege that Clark was the mastermind of the scheme that hacked accounts of celebrities and politicians, and sent tweets from their accounts seeking payments of Bitcoin, the Tampa Bay Times reported.

Clark's attorney, David Weisbrok, argued it wasn't reasonable to set bail at six times the amount his client is accused of stealing. Lawyers have said he has $3 million in Bitcoin under his control, the newspaper reported.

Prosecutors had sought to have Clark held on $30 million, which is $1 million for each charge Clark faces — 17 counts of communications fraud, 11 counts of fraudulent use of personal information, and one count each of organized fraud of more than $5,000 and accessing computers or electronic devices without authority.

Officials said Clark poses a threat to society if he has access to a computer. The state attorney's office is prosecuting him as an adult.

They want Clark to prove the money he puts up for bail was obtained legitimately rather than through criminal activity.

Two other men also were charged in the case. Mason Sheppard, 19, of Bognor Regis, United Kingdom, and Nima Fazeli, 22, of Orlando, were charged separately last week in California federal court.

Fazeli’s father told The Associated Press on Friday that he’s absolutely certain his son is innocent.

“He’s a very good person, very honest, very smart and loyal,” Mohamad Fazeli said. “We are as shocked as everybody else. “I’m sure this is a mix up.”

Federal court records didn’t list attorneys for Sheppard or Fazeli.

Also read

Apple. Biden, Musk and Highly-Verified-Twitter Accounts hacked by crypto scam

During the high-profile security breach on July 15, authorities say, tweets were sent from the accounts of Barack Obama, Joe Biden, Mike Bloomberg and a number of tech billionaires including Amazon CEO Jeff Bezos, Microsoft co-founder Bill Gates and Tesla CEO Elon Musk. Celebrities Kanye West and his wife, Kim Kardashian West, also were hacked.

Reference: www.abcnews.go.com

Comments

Popular posts from this blog

List Of Sql Infected Sites-HACKEREAD

SQL injection  is a  code injection  technique, used to  attack  data-driven applications, in which malicious  SQL  statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).  SQL injection must exploit a  security vulnerability  in an application's software, for example, when user input is either incorrectly filtered for  string literal   escape characters  embedded in SQL statements or user input is not  strongly typed  and unexpectedly executed. SQL injection is mostly known as an attack  vector  for websites but can be used to attack any type of SQL database. List of SQL Infected sites:  http://www.genhound.co.uk/source.php?id=477 http://www.lcoastpress.com/journal.php?id=8 http://www.travellers-tales.co.uk/travelJournal.php?id=42 http://www.arrowvalves.co.uk/content.php?id=8 http://www.reaplasrack.co.uk/content.php?id=129 http://www.arrowval...

Google dork list for XSS (Cross- site scripting)-2020

GOOGLE DORK LIST FOR Cross-site scripting -2020 Google Dorks  its also known as google query ,List “Google Hacking” is mainly referred to pull the sensitive information from Google using advanced search terms that help users to search the index of a specific website, specific file type and some interesting information from unsecured Websites. Google Dorks list  2020 can uncover some incredible information such as email addresses and lists, login credentials, sensitive files, website vulnerabilities, and even financial information (e.g. payment card data). Here you can see an example to understand how  Google Darks   password  used by hackers to gain sensitive information from specific websites. You can also use for Exploit DB site to give you according to you Search state. https://www.exploit-db.com/ “ inurl: domain/ ” “ additional dorks A hacker would simply use in the desired parameters as follows: inurl = the URL of a site you want...

Popular Android Zombie game phish users to steal Gmail credentials

The app made its way to Google Play Store was also found phishing users for Facebook credentials. Scary Granny ZOMBY Mod: The Horror Game 2019 is the latest game on Google Play Store that is condemned by the digital security fraternity for sneakily stealing personal data from unsuspecting users. The game, which has been downloaded for over 50,000 times, was available for Android devices making Android users its primary target. The malicious app attempts to collect sensitive information such as Facebook and Gmail login credentials. The malicious activities of Scary Granny ZOMBY Mod were detected by the mobile security firm Wandera. The company found out that the app asks users to enter their Gmail or other Google account credentials, which are then used for collecting private data of the user by hijacking the account –  All of this happens, unsurprisingly, without alerting the user. Gmail phishing page on the supposed gaming app (Screenshot: Wandera) Rese...