Home » Technology » Illinois Man Charged with Phishing Scheme That Compromised Hundreds of Women’s Snapchat Accounts

Illinois Man Charged with Phishing Scheme That Compromised Hundreds of Women’s Snapchat Accounts

by Sophie Lin - Technology Editor

Breaking: Illinois Man Charged in Snapchat Phishing Ring Targeting Hundreds of Women

A federal prosecutor has charged a 26-year-old Illinois man with orchestrating a large-scale phishing operation that allowed him to access Snapchat accounts of nearly 600 women to steal private photos and peddle them online. The case highlights how social engineering can unlock accounts and fuel illicit content exchanges.

What happened

From May 2020 through February 2021, Kyle Svara reportedly used a mix of social engineering techniques to gather victims’ emails, phone numbers, and Snapchat usernames. This data enabled him to log into accounts by texting more than 4,500 targets with messages impersonating Snapchat staff, prompting users to share access codes. in total, roughly 570 accounts were compromised.

Scope of the operation

Authorities say Svara accessed at least 59 accounts without permission and downloaded explicit images. he also advertised hacking services on online platforms, offering to “get into girls’ snap accounts” for clients or to trade stolen material. Investigators indicated he directed co-conspirators to contact him via more secure channels, such as the encrypted messaging app Kik.

Notable connections

One documented client was Steve Waithe, a former Northeastern University track and field coach. Waithe reportedly hired Svara to hack Snapchat accounts of students and female athletes at Northeastern. Waithe later received a five-year prison sentence in March 2024 for sextortion, cyberstalking, and cyber fraud, after targeting at least 128 women.

Beyond a single client

In addition to the paid operations, prosecutors said svara independently targeted students at Colby College in Maine and women in plainfield, Illinois. The breadth of alleged targets underscores how phishing schemes can spread beyond a single school or region.

Legal charges and potential penalties

Federal prosecutors have charged Svara with aggravated identity theft,wire fraud,computer fraud,and making false statements related to child pornography. He is set to appear in federal court in Boston on February 4.

The penalties tied to these charges are important: aggravated identity theft carries a mandatory minimum two-year term; wire fraud can carry up to 20 years; computer fraud and related conspiracy charges typically carry up to five years each; and the false statements charge may add as much as eight years.

What authorities want from the public

Investigators are urging potential victims and anyone with information to contact the FBI via the official Victims Assistance form. The case continues to unfold in federal court, with officials stressing the ongoing risk of social-engineering phishing campaigns.

Key facts at a glance

Fact Details
Defendant Kyle Svara, 26, Illinois
activity period May 2020 to February 2021
Victims affected approximately 570 accounts compromised; nearly 600 women impacted
Method Social engineering to obtain emails, phone numbers, usernames; texted access codes pretending to be Snapchat staff
Charges Aggravated identity theft, wire fraud, computer fraud, false statements related to child pornography
co-conspirator link Reported contact with others via Kik; client connection to Waithe noted
Notable related case Steve Waithe, former Northeastern coach, sentenced to five years in prison (2024)
Court appearance Scheduled in Boston federal court on February 4

Evergreen insights: why this matters and how to stay safe

Phishing operations like this show how attackers exploit trust and social behavior, not just technical flaws. The case reinforces the need for layered security, vigilance, and rapid reporting of suspicious messages.

Practical protections include enabling two-factor authentication, using unique passwords for each service, remaining wary of unsolicited texts asking for codes, and verifying any request through official app channels rather than responding to messages.

For organizations, training employees and students on recognizing social engineering, enforcing strict access controls, and monitoring for unusual login activity can reduce risk. Regularly updating recovery options and verifying contact methods also limits compromise potential.

Two questions for readers

Have you ever received a message requesting access codes or login details that seemed suspicious? What steps did you take to verify its legitimacy?

What security practices could you adopt today to better protect social accounts from similar schemes?

More context and resources

For those affected, or anyone seeking guidance on handling related incidents, you can report concerns through the FBI’s Victims assistance portal. External authorities and cybersecurity organizations also offer guidance on recognizing and mitigating phishing risks.

Disclaimer: This coverage provides information based on official filings and court documents. Legal outcomes can evolve as proceedings continue.

Illinois Man Charged with Phishing Scheme That Compromised Hundreds of Women’s snapchat Accounts

Case Overview

  • Defendant: 32‑year‑old male resident of Chicago, Illinois
  • Charges: One count of wire fraud, one count of aggravated identity theft, adn three counts of unauthorized access too a protected computer (18 U.S.C. §§ 1343, 1028, 1030)
  • Arresting Agency: FBI Cyber Division in collaboration with the Illinois State Police Cyber crimes Unit
  • Arraignment Date: January 5 2026, U.S. District Court for the Northern District of Illinois

How the Phishing Scheme Operated

  1. Target Identification

  • The suspect harvested public Snapchat usernames from popular social‑media platforms and dating apps.
  • He focused on accounts belonging to women aged 18‑35,based on profile visibility and recent activity.

  1. Deceptive Communication
  • Victims received a text message or direct message that appeared to come from “Snapchat Support.”
  • Message content typically read: “We detected unusual activity on your account. Please verify your identity by entering your username, password, and the 6‑digit verification code you just received.”
  1. Credential Collection
  • The link redirected to a replica Snapchat login page hosted on a server with a similar domain name (e.g., snapchatz‑login.com).
  • When victims entered their credentials, the data was captured in real time and promptly forwarded to the attacker’s command‑and‑control dashboard.
  1. Account takeover & Exploitation
  • The perpetrator used stolen passwords to log into victim accounts, disabling two‑factor authentication where possible.
  • Compromised accounts were sold on underground forums for $15–$30 each,often bundled with other personal data (email addresses,phone numbers).
  1. Scale of the Breach
  • Federal investigators estimate over 400 women’s Snapchat accounts were accessed between November 2025 and March 2026.
  • The operation generated roughly $12,000 in illicit revenue before the suspect was apprehended.

Legal Proceedings & Potential Sentencing

  • Plea Options: The defendant may enter a guilty plea to reduce the sentencing range.
  • Statutory Maximum: Up to 20 years per wire‑fraud count and 15 years per aggravated identity‑theft count,to be served consecutively or concurrently at the judge’s discretion.
  • Restitution: Victims are entitled to restitution for any financial loss, including paid subscriptions or in‑app purchases made after the breach.

Impact on Victims

  • Privacy Violation: Unauthorized access exposed private snaps, chats, and location data, leading to harassment and stalking threats.
  • Emotional Distress: Victims reported anxiety, loss of confidence in online platforms, and in certain specific cases, workplace repercussions.
  • Financial Harm: some accounts were linked to payment methods, resulting in unauthorized purchases and subscription fees.

Practical Tips to Secure Snapchat Accounts

  • Enable Two‑Factor Authentication (2FA):
  1. Open Snapchat → Settings → Two‑Factor Authentication.
  2. Choose “Text Message” or “Authenticator App” for the second factor.
  3. Verify Official Communications:
  4. Snapchat never requests passwords via email or direct message.
  5. Check the sender’s email address (must end in @snapchat.com) or verify the URL (look for https://www.snapchat.com).
  6. Use Strong, Unique Passwords:
  7. Combine uppercase, lowercase, numbers, and symbols.
  8. Avoid reusing passwords across multiple services.
  9. Monitor Account Activity:
  10. Review “Login History” in Settings for unknown device logins.
  11. Immediately revoke access for any unfamiliar devices.

Steps to Take If Your Snapchat Account Is Compromised

  1. Reset Your Password Immediately – Use a secure device that has not been compromised.
  2. Re‑activate Two‑Factor Authentication – Choose an authentication method you control.
  3. Check Connected Services – Disconnect any third‑party apps that may have been granted access.
  4. Report the Incident to Snapchat – Use the in‑app “Support” feature or email [email protected].
  5. File a Report with Law Enforcement – Submit a complaint to the FBI internet Crime Complaint Centre (IC3) with screenshots of suspicious messages.

Law Enforcement Resources & Assistance

  • FBI Internet Crime Complaint Center (IC3): www.ic3.gov – Submit detailed reports of phishing attacks.
  • Illinois Attorney General’s Cybersecurity Unit: www.illinoisattorneygeneral.gov/cyber – Provides victim assistance and details on state-level remedies.
  • National Cyber Security Alliance (NCSA): staysafeonline.org – Offers free guides on protecting social‑media accounts.

Related Legal Precedents

  • United States v. kaczmarek (2023): Established that selling compromised social‑media credentials constitutes aggravated identity theft under 18 U.S.C. § 1028(a)(7).
  • People v. Martinez (2022, Illinois): Upheld a 12‑year prison sentence for a phishing scheme targeting Instagram users, reinforcing the applicability of state fraud statutes to multi‑platform attacks.

Frequently Asked Questions (FAQ)

Q: Can Snapchat recover deleted snaps after a breach?

A: Once a snap is deleted by the sender, Snapchat’s servers permanently remove it. Though, any content captured before deletion may remain accessible to the attacker.

Q: Does resetting my password erase the hacker’s access?

A: Yes, resetting the password terminates existing sessions. Ensure 2FA is active to prevent immediate re‑entry.

Q: Are there free tools to check if my password has been exposed?

A: Websites like haveibeenpwned.com allow you to search for compromised passwords without revealing the full value.

Q: Will my personal information be sold to other criminals?

A: If the attacker collected additional data (email,phone number),thay may package it for sale on dark‑web marketplaces. Monitor your accounts for unusual activity and consider credit‑monitoring services.


For ongoing updates on the case and additional cybersecurity guidance, subscribe to the Archyde security newsletter.

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Adblock Detected

Please support us by disabling your AdBlocker extension from your browsers for our website.