Friday, April 11, 2025
HomeCyber CrimeTwo Teenagers of Lapsus$ Hacking Group Charged

Two Teenagers of Lapsus$ Hacking Group Charged

Published on

SIEM as a Service

Follow Us on Google News

The Lapsus$ hacking group has been on the headlines ever since they hacked the biggest firms like Microsoft, Nvidia, Samsung, etc.

Many law enforcement agencies were on their tail. They have been posting a lot of leaks on their telegram channel. Recently, they posted about some of their friends who are “on vacation”. 

Image

- Advertisement - Google News

Following this, two teenagers under the age of 16 and 17 were arrested by the UK Police Department. Since they were under the age of 18, personal information about them was kept confidential. 

The arrest coincided with the group posting about the vacation. However, they still continue to breach organizations and post sensitive data.

In the previous week, City of London Police arrested seven people in connection with the Lapsus$ hacking group. All of them were between the ages of 16 and 21.

The two teenagers were charged with three counts of Computer Misuse Act 1990, Section 3 (unauthorized access with intent to impair the operation of or hinder, access to a computer and two counts of fraud by false representation)

The 16-year-old was also charged with one count of the Computer Misuse Act 1990, Section 1 (causing a computer to perform a function to secure unauthorized access to a programme).

The FBI has also appealed for information about the people behind the hacking crew.

Currently, there are 45,000 followers on Telegram for the Lapsus$ group. 

On the 1st of April, they both appeared in a UK court. Prosecutor Valerie Benjamin has sent the case to crown court since it’s complex and many people are allegedly involved. Details about the suspects remain unrevealed due to Legal restrictions.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

Threat actors are increasingly using email bombing to bypass security protocols and facilitate further...

Threat Actors Launch Active Attacks on Semiconductor Firms Using Zero-Day Exploits

Semiconductor companies, pivotal in the tech industry for their role in producing components integral...

Hackers Exploit Router Flaws in Ongoing Attacks on Enterprise Networks

Enterprises are facing heightened cyber threats as attackers increasingly target network infrastructure, particularly routers,...

Threat Actors Exploit Legitimate Crypto Packages to Deliver Malicious Code

Threat actors are using open-source software (OSS) repositories to install malicious code into trusted...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

Threat actors are increasingly using email bombing to bypass security protocols and facilitate further...

Threat Actors Launch Active Attacks on Semiconductor Firms Using Zero-Day Exploits

Semiconductor companies, pivotal in the tech industry for their role in producing components integral...

Hackers Exploit Router Flaws in Ongoing Attacks on Enterprise Networks

Enterprises are facing heightened cyber threats as attackers increasingly target network infrastructure, particularly routers,...