Home » Tech » Snapchat Accounts Hacked: Man Pleads Guilty to 571 Breaches via Social Engineering

Snapchat Accounts Hacked: Man Pleads Guilty to 571 Breaches via Social Engineering

by Lisa Park - Tech Editor

An Illinois man has pleaded guilty to a sophisticated phishing scheme that compromised nearly 600 Snapchat accounts, exploiting a vulnerability in the platform’s two-factor authentication process without directly breaching Snapchat’s servers. Kyle Svara, 27, of Oswego, Illinois, admitted to federal crimes on , according to court documents and reporting from CBS News and Reuters.

Svara’s method relied on social engineering, a technique that manipulates individuals into divulging sensitive information. He collected email addresses, phone numbers, and Snapchat usernames, then impersonated Snapchat support staff to request six-digit verification codes sent via SMS. By convincing victims to provide these codes, Svara bypassed Snapchat’s security measures and gained access to their accounts. Crucially, he did not need to crack Snapchat’s core infrastructure; the vulnerability lay in human trust and the reliance on SMS-based two-factor authentication.

The scheme operated between and . Svara sent over 4,500 messages posing as Snapchat support, successfully tricking 571 individuals into handing over their codes. He then accessed the accounts of at least 59 women, downloading nude or semi-nude images from their “My Eyes Only” sections – a feature designed for private content sharing. He advertised his services on platforms like Reddit, offering to hack accounts and provide content “for you or trade,” according to charging documents.

The motivation behind the attacks was financial gain. Svara sold or traded the stolen images on internet forums to individuals who requested access to specific accounts, including Steve Waithe, a former Northeastern University track and field coach. Waithe pleaded guilty to cyberstalking, computer fraud, and wire fraud charges related to the scheme and was sentenced to five years in prison. Some of Waithe’s victims were female student athletes he had coached, highlighting the particularly predatory nature of his actions.

The case underscores the limitations of SMS-based two-factor authentication. While better than no authentication at all, SMS is susceptible to “SIM swapping” attacks and, as demonstrated by Svara, phishing. Attackers can intercept SMS messages or, as in this case, simply convince users to provide the codes themselves. More secure authentication methods, such as authenticator apps (like Google Authenticator or Authy) or hardware security keys (like YubiKey), are significantly more resistant to these types of attacks.

Svara faces a potential prison sentence of more than 20 years, stemming from charges including aggravated identity theft, wire fraud, computer fraud, conspiracy to commit computer fraud, and false statements related to child pornography. Prosecutors have agreed to recommend a three-year sentence at his sentencing hearing on . His lawyer, Todd Pugh, stated that Svara has accepted full responsibility for his actions.

The incident also raises questions about the responsibility of social media platforms to educate users about phishing and the importance of strong authentication practices. Snapchat, like many platforms, relies heavily on user awareness to prevent these types of attacks. While the company has implemented security measures, the success of Svara’s scheme demonstrates that ongoing vigilance and user education are crucial.

This case is not an isolated incident. Phishing attacks remain a prevalent threat, and attackers are constantly evolving their tactics. The ease with which Svara was able to compromise hundreds of accounts highlights the ongoing need for users to be skeptical of unsolicited requests for personal information, even those appearing to come from legitimate sources. The reliance on SMS-based two-factor authentication, while still common, is increasingly recognized as a weak point in many security systems, and a shift towards more robust methods is essential to protect user data.

The charges against Svara include usurpation of identity, computer fraud, electronic fraud, and false testimony, as reported by Yahoo News. The potential penalties could be increased if evidence of sexual exploitation, significant financial gain, or a pattern of repeat offenses is discovered.

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.