An Illinois man pleaded guilty to hacking nearly 600 women's Snapchat accounts using phishing tactics, stealing intimate photos for distribution and sale, highlighting critical security vulnerabilities in social media platforms.

Kyle Svara, a 26-year-old Illinois resident, has pleaded guilty to orchestrating a widespread hacking campaign that compromised approximately 600 women's Snapchat accounts between May 2020 and February 2021. Court documents reveal Svara used sophisticated social engineering tactics to harvest credentials, ultimately accessing private accounts to steal intimate photos that he stored, sold, or traded online. This case underscores ongoing vulnerabilities in social media platforms and the devastating real-world consequences of account takeovers.
How the Attacks Worked
Svara's operation relied on multi-step phishing attacks:
- Information Gathering: He collected victims' email addresses, phone numbers, and Snapchat usernames through social media reconnaissance
- Impersonation: Masquerading as Snapchat support staff, he sent over 4,500 SMS messages requesting account verification codes
- Account Access: Using harvested credentials, he bypassed authentication to access at least 59 accounts
- Data Exploitation: Stolen intimate photos were compiled into databases for personal use, sale on underground forums, and trading through encrypted platforms like Kik
Notably, Svara operated as a 'hacker-for-hire,' with clients including former Northeastern University track coach Steve Waithe—already serving a 5-year sentence for sextortion. Svara specifically targeted female athletes at Northeastern University, Colby College, and residents of Plainfield, Illinois.
Broader Security Implications
This case exemplifies several critical security challenges:
- Social Engineering Effectiveness: Despite platform safeguards, targeted phishing remains highly effective when exploiting human trust
- Secondary Market for Compromised Data: Stolen content fuels a thriving underground economy, with buyers often seeking access to specific individuals
- Platform Limitations: Snapchat's ephemeral content model creates false sense of security; stolen media becomes permanent once saved
John Bambenek, President of Bambenek Consulting, notes: "Platforms must move beyond SMS-based 2FA as the gold standard. When attackers bypass these through vishing or SIM-swapping, users have few defenses. Hardware security keys and app-based authenticators provide substantially stronger protection."
Protective Measures for Users
Based on forensic analysis of Svara's methods, security experts recommend:
- Enable Advanced Authentication: Use Snapchat's login verification with authenticator apps instead of SMS
- Recognize Phishing Red Flags: Legitimate services never request verification codes via unsolicited messages
- Limit Publicly Available Information: Restrict sharing of phone numbers/emails tied to accounts on social profiles
- Conduct Regular Privacy Audits: Review Snapchat's Privacy Settings monthly to control data visibility
- Report Suspicious Activity Immediately: Use Snapchat's support portal for compromised accounts
Svara faces multiple felony charges including aggravated identity theft (mandatory 2-year minimum), wire fraud (up to 20 years), computer fraud (5 years), and false statements related to child exploitation material (8 years maximum). His sentencing before U.S. District Judge Brian E. Murphy is scheduled for May 18, 2026.
This case serves as a stark reminder that social media security requires continuous vigilance from both platforms and users. As digital intimacy becomes increasingly prevalent, implementing advanced authentication methods and recognizing social engineering tactics remain essential defenses against evolving threats.

Comments
Please log in or register to join the discussion