
SEC Hacker‘s Google Search: ‘Am I Being Investigated by the FBI?’
The tale of Eric Council Jr., the SIM swap hacker who infiltrated the Securities and Exchange Commission’s Twitter account last year, continues to unfold. Recent court filings reveal that Council, who gained notoriety for manipulating the market with a false announcement about a Bitcoin ETF approval, was not only aware of the potential consequences of his actions but also seemed to be actively concerned about the FBI’s interest in him.
Prosecutors are seeking a two-year prison sentence for Council, citing his role in the hack that sent shockwaves through the crypto markets. The incident, which saw the SEC‘s Twitter account disseminate a fabricated statement on January 9, 2024, caused Bitcoin‘s price to surge before abruptly plunging, wiping out millions of dollars in market positions.
The SEC‘s security team later confirmed that the account lacked two-factor authentication at the time of the attack, highlighting a critical security oversight. Council’s actions, however, were not a one-off exploit. Court documents reveal that he had been involved in similar SIM swapping schemes for months, amassing approximately $50,000 from his illicit operations.
Evidence of a Cybercriminal’s Concern
Prosecutors discovered that Council had searched online for information about FBI investigations, specifically inquiring, “How can I know for sure if I am being investigated by the FBI” and “How long does it take to delete Telegram account.” This search history, coupled with Council’s attempts to delete incriminating Telegram conversations, suggests an awareness of his precarious legal position.
Further investigation revealed that Council had been advertising his SIM swap expertise on Telegram under the alias ‘easymunny’, offering his services for a fee ranging from $1,200 to $1,500. He facilitated these attacks by obtaining fake identity documents, impersonating individuals with access to targeted accounts, and manipulating telecommunications companies like AT&T.

Council’s meticulous approach to SIM swapping involved obtaining the last four digits of victims’ Social Security numbers and driver’s licenses to successfully transfer phone numbers to his control. He then used these hijacked phones to gain access to sensitive accounts, including the SEC‘s Twitter account.

A Web of Deceit
His scheme unraveled on June 12, 2024, when surveillance agents observed him attempting another SIM swap at an Apple store. Following a search warrant six days later, law enforcement recovered evidence, including templates for fake ID cards, further solidifying his role in the hacking operation. Council pleaded guilty on February 10 to charges of Conspiracy to Commit Aggravated Identity Theft and Access Device Fraud.
The SEC hacker‘s case serves as a stark reminder of the vulnerabilities inherent in today’s digital landscape, particularly within the realm of social media and online platforms. It highlights the need for robust security measures, including multi-factor authentication, and underscores the importance of vigilance against sophisticated social engineering techniques.
The ongoing investigation into Council’s activities, coupled with his upcoming sentencing, sheds light on the intricate world of cybercrime and its potential impact on the financial markets. As the digital landscape evolves, so too must cybersecurity strategies to combat increasingly sophisticated threats.