Tuesday, March 4, 2025
HomeHacksHacker who Stolen Personal details of users from Various sites Including Uber...

Hacker who Stolen Personal details of users from Various sites Including Uber and Groupon Pleaded Guilty

Published on

SIEM as a Service

Follow Us on Google News

A UK man Grant West, 25, charged for launching brute-force attack on 17 websites including Uber, Groupon sites and for selling the information in Dark Web shops.

He got hold of 165,000 customers details from Justeat in a five-month period between July and December 2015.

He used Bruteforce tool named Sentry MBA to find users and then break into the account for harvesting further information, West carried out attacks on 17 websites Uber, Groupon, T Mobile, Just Eat, Ladbrokes, Asda, Argos, Nectar, Sainsbury’s, AO.com, Coral Betting, Vitality, RS Feva Class Association 2017, the British Cardiovascular Society, Mighty Deals Limited, Truly Experiences Ltd, and M R Porter.

He used online identity as “Courvoisier” also sold cannabis, all the transactions carried through bitcoins.West bundled all the stolen details as “fullz.”

Also Read Man Hacked into Jail Computer Network to Change his Friend Release Date

No financial information has been obtained, Police raided, and they have found £25,000 in cash and pieces of cannabis(drugs) and now he was taken into custody, and his sentencing postponed to a later date.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring...

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March...

Threat Actors Exploiting AES Encryption for Stealthy Payload Protection

Cybersecurity researchers have uncovered a surge in the use of Advanced Encryption Standard (AES)...

33.3 Million Cyber Attacks Targeted Mobile Devices in 2024 as Threats Surge

Kaspersky's latest report on mobile malware evolution in 2024 reveals a significant increase in...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Salt Typhoon Hacked Nine U.S. Telecoms, Tactics and Techniques Revealed

Salt Typhoon, a state-sponsored Advanced Persistent Threat (APT) group linked to the People's Republic...

APT32 Hacker Group Attacking Cybersecurity Professionals Poisoning GitHub

The malicious Southeast Asian APT group known as OceanLotus (APT32) has been implicated in...

Casio Hacked – Servers Compromised by a Ransomware Attack

Casio Computer Co., Ltd. has confirmed a significant cybersecurity breach after its servers were...