Friday, March 29, 2024

Member of Dark Overlord Hacker Group Sentenced to Five Years in Prison for Stealing Medical and Financial Data

Nathan Wyatt, 39, United Kingdom national pleaded for his role in “The Dark Overlord” Hacking Group conspired to steal personal and medical data. He was sentenced to five years in federal prison.

The Dark Overlord is a well-known hacking group that specializes in stealing sensitive information and threaten victims with exposure unless the ransom is paid.

The group hacks multiple organizations in the US and UK to steal the data and threatens them for a ransom payment. The target number of organizations including healthcare, financial, legal, film, and others.

Nathan Wyatt was extradited from the United Kingdom to the United States on Dec 19, 2019, according to court documents he played a key role in hacking activity.

“U.S. District Judge Ronnie White for the Eastern District of Missouri sentenced Nathan Wyatt, 39, who participated in a computer hacking collective known as “The Dark Overlord,” which targeted victims in the St. Louis area beginning in 2016. Judge also ordered Wyatt to pay $1,467,048 in restitution.”

According to the indictment, The Dark Overlord has victimized innumerable employers in the United States, many of them affected repeatedly.

“Nathan Wyatt used his technical skills to prey on Americans’ private data and exploited the sensitive nature of their medical and financial records for his gain,” said Acting Assistant Attorney General Brian C. Rabbitt of the Justice Department’s Criminal Division.

Wyatt said that he was part of the group beginning in 2016 and he is responsible for accessing the number U.S. company’s computer network without authorization.

“Wyatt admitted that The Dark Overlord co-conspirators acted by obtaining sensitive data from victim companies, including patient medical records and personal identifying information, and then threatening to release the companies’ stolen data unless the companies paid a ransom of between $75,000 and $350,000 in bitcoin.”

He also said that he played a role in creating, validating, and maintaining communication, payment, and virtual private network accounts.

Wyatt apologized during the hearing, held via Zoom, saying that he was on medication for mental problems that led him to make bad decisions.

Wyatt lawyer, Brocca Morrison, noted that Wyatt did not orchestrate the hacks and is the only hacker who has been identified.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Also Read

Operator Behind the Most Infamous GandCrab Ransomware Arrested in Belarus

Interpol Arrested 3 Indonesian Hackers Who have Hacked Hundreds of Ecommerce Websites With JS-Sniffer Malware

Website

Latest articles

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles