It definitely wasn't a mobile phone trojan. Most cell phone websites allow you to reset passwords for the account via telephone number which then sends a confirmation email to the registered email account. If you can get the email account, you can get the phone account. Blue tooth exploits could mostly likely accomplish most of the things that were stated in the article.