Monday, November 25, 2024
HomeCyber CrimeMember of Dark Overlord Hacker Group Sentenced to Five Years in Prison...

Member of Dark Overlord Hacker Group Sentenced to Five Years in Prison for Stealing Medical and Financial Data

Published on

Nathan Wyatt, 39, United Kingdom national pleaded for his role in “The Dark Overlord” Hacking Group conspired to steal personal and medical data. He was sentenced to five years in federal prison.

The Dark Overlord is a well-known hacking group that specializes in stealing sensitive information and threaten victims with exposure unless the ransom is paid.

The group hacks multiple organizations in the US and UK to steal the data and threatens them for a ransom payment. The target number of organizations including healthcare, financial, legal, film, and others.

- Advertisement - SIEM as a Service

Nathan Wyatt was extradited from the United Kingdom to the United States on Dec 19, 2019, according to court documents he played a key role in hacking activity.

“U.S. District Judge Ronnie White for the Eastern District of Missouri sentenced Nathan Wyatt, 39, who participated in a computer hacking collective known as “The Dark Overlord,” which targeted victims in the St. Louis area beginning in 2016. Judge also ordered Wyatt to pay $1,467,048 in restitution.”

According to the indictment, The Dark Overlord has victimized innumerable employers in the United States, many of them affected repeatedly.

“Nathan Wyatt used his technical skills to prey on Americans’ private data and exploited the sensitive nature of their medical and financial records for his gain,” said Acting Assistant Attorney General Brian C. Rabbitt of the Justice Department’s Criminal Division.

Wyatt said that he was part of the group beginning in 2016 and he is responsible for accessing the number U.S. company’s computer network without authorization.

“Wyatt admitted that The Dark Overlord co-conspirators acted by obtaining sensitive data from victim companies, including patient medical records and personal identifying information, and then threatening to release the companies’ stolen data unless the companies paid a ransom of between $75,000 and $350,000 in bitcoin.”

He also said that he played a role in creating, validating, and maintaining communication, payment, and virtual private network accounts.

Wyatt apologized during the hearing, held via Zoom, saying that he was on medication for mental problems that led him to make bad decisions.

Wyatt lawyer, Brocca Morrison, noted that Wyatt did not orchestrate the hacks and is the only hacker who has been identified.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Also Read

Operator Behind the Most Infamous GandCrab Ransomware Arrested in Belarus

Interpol Arrested 3 Indonesian Hackers Who have Hacked Hundreds of Ecommerce Websites With JS-Sniffer Malware

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...