British Hacker Nets $3.75 Million in Sophisticated ‘Hack-to-Trade’ Scheme, Faces 20 Years in U.S. Prison

British Hacker Nets $3.75 Million in Sophisticated ‘Hack-to-Trade’ Scheme, Faces 20 Years in U.S. Prison

By
Super Mateo
4 min read

British Hacker Robert Westbrook Charged in $3.75 Million ‘Hack-to-Trade’ Scheme

In a sophisticated cyber-financial crime that spanned from January 2019 to May 2020, 39-year-old British national Robert Westbrook has been charged with executing a "hack-to-trade" scheme, which reportedly netted him over $3.75 million in illicit profits. U.S. authorities revealed that Westbrook hacked into the Office 365 email accounts of corporate executives from five U.S. public companies, gaining unauthorized access to confidential, non-public information about their earnings announcements. He then used this insider information to trade stocks before the earnings became public, profiting significantly from the stock movements.

Westbrook managed to evade detection for over a year by utilizing advanced concealment techniques, including resetting email passwords, creating auto-forwarding rules to continuously access sensitive data, and masking his identity through anonymous email accounts and VPN services. Furthermore, he conducted his financial transactions using cryptocurrencies, adding an additional layer of difficulty in tracing his activities. However, the U.S. Securities and Exchange Commission (SEC) and the FBI ultimately uncovered his operation through advanced data analytics and cryptocurrency tracing, leading to his arrest in the United Kingdom. Westbrook now faces extradition to the U.S., where he is charged with securities fraud, wire fraud, and computer fraud—crimes that could result in up to 20 years in prison and substantial financial penalties.

Key Takeaways:

  • Robert Westbrook, a British hacker, is charged with using insider information from corporate email accounts to make illegal stock trades, netting over $3.75 million in profits.
  • Westbrook’s scheme involved hacking into Office 365 email accounts of executives at five U.S. public companies and accessing confidential earnings information.
  • To cover his tracks, Westbrook used anonymous email accounts, VPN services, and cryptocurrencies for transactions, which initially helped him evade detection.
  • The SEC and FBI used advanced technologies, including data analytics and cryptocurrency tracing, to uncover his activities.
  • Westbrook was arrested in the U.K. and now faces extradition to the U.S., where he could face up to 20 years in prison for securities, wire, and computer fraud.

Deep Analysis:

Westbrook’s case underscores the escalating complexity of cyber-enabled financial crimes, a growing concern for financial markets globally. His method of exploiting weak security protocols, like auto-forwarding rules in corporate email systems, reflects a common vulnerability in organizations. Auto-forwarding allows employees to automatically forward emails to external addresses, a feature that, if not monitored carefully, can enable prolonged access to sensitive data. In Westbrook’s case, his use of this feature, combined with resetting passwords, provided him with a steady stream of insider information about companies' earnings, enabling him to time his trades precisely.

The sophistication of Westbrook's concealment techniques highlights how cybercriminals increasingly rely on tools like VPNs and cryptocurrencies to mask their identities and cover their tracks. VPN services allowed him to hide his true IP address, while cryptocurrencies provided anonymity in financial transactions. Although these tools initially kept him under the radar, the investigation led by the SEC and FBI shows that regulatory bodies are becoming more adept at detecting and unraveling complex cybercrime schemes. The use of advanced data analytics and crypto asset tracing played a pivotal role in linking Westbrook’s trading activities to the hacking incidents, proving that even the most sophisticated cybercriminals can be caught.

This case serves as a warning to companies about the importance of robust cybersecurity measures. Lax internal controls, especially around email access and auto-forwarding, can provide fertile ground for cybercriminals to exploit. It also demonstrates the growing capabilities of regulatory and law enforcement agencies in utilizing technology to combat financial crimes that cross international borders.

Did You Know?

  • The SEC's Crypto Assets and Cyber Unit was instrumental in tracking down Westbrook's illegal activities. This unit specializes in investigating fraud related to cryptocurrencies and cybercrimes, showcasing the growing importance of tech-driven forensic techniques in financial regulation.

  • Westbrook’s scheme is part of a broader trend where hackers target non-public corporate information to commit financial crimes. In fact, this type of "hack-to-trade" crime is becoming more common as businesses increasingly rely on digital platforms for communication and data storage.

  • Auto-forwarding rules, like the ones Westbrook exploited, are a common feature in many organizations, but not all companies have strong monitoring mechanisms in place. This makes them a potential vulnerability for data breaches if not properly controlled.

  • While cryptocurrencies are often seen as anonymous and untraceable, regulatory bodies like the SEC and FBI have developed tools to track cryptocurrency transactions, making it harder for criminals to hide behind digital currencies.

  • The maximum sentence Westbrook faces—20 years in prison and millions in fines—is a testament to the severity with which the U.S. treats crimes that undermine the integrity of its financial markets.

Robert Westbrook's case is a stark reminder that as cybercriminals become more sophisticated, so too must the tools and technologies that protect financial systems. His arrest not only sheds light on the vulnerabilities within corporate cybersecurity but also highlights the importance of regulatory oversight in maintaining fair and transparent financial markets.

You May Also Like

This article is submitted by our user under the News Submission Rules and Guidelines. The cover photo is computer generated art for illustrative purposes only; not indicative of factual content. If you believe this article infringes upon copyright rights, please do not hesitate to report it by sending an email to us. Your vigilance and cooperation are invaluable in helping us maintain a respectful and legally compliant community.

Subscribe to our Newsletter

Get the latest in enterprise business and tech with exclusive peeks at our new offerings