Friday, March 14, 2025
HomeComputer SecurityTwo Young Hackers Jailed For Hacking TalkTalk that Costs £77million

Two Young Hackers Jailed For Hacking TalkTalk that Costs £77million

Published on

SIEM as a Service

Follow Us on Google News

Two young hackers jailed for their roles in a hack attack on TalkTalk which hit 157,000 accounts and costs £77million.

Matthew Hanley, 23, who hacked the site in 2015 and stolen personal and financial information of more than 156,000 customers and he handed the details to 21-year-old friend Connor Allsopp and he sold the data for another online user for fraud.

The Judge Anuja Dhir QC jailed Hanley for 12 months and his friend Allsopp for eight months. Judge Dhir said it was a tragedy to find ‘two individuals of such extraordinary talent’ reported Dailymail.

The hack attack allows other to gain access to the confidential information of TalkTalk’s clients and the total estimated loss is about £77 million.

The stolen personal information including the company customers’ full names, postal addresses, dates of birth, telephone numbers, email addresses and in most cases attackers accessed financial information also.

Hanley admitted hacking into TalkTalk and shared the financial and personal information of more than 8,000 customers to Allsopp and another online user.

Allsopp admitted he involved in the selling of TalkTalk customers’data to online users and other files for hacking.

Daniel Kelley, 19 was arrested for trying to blackmail TalkTalk CEO and demanded 465 bitcoins. Following the hack TalkTalk CEO subjected to a number of blackmail attempts.

TalkTalk is one of the telecommunication company in the UK, between 15 and 21 of October 2015 hackers exploited an SQL injection vulnerability and extracted data using the automated SQLmap tool.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Pwn2Own – Ethical Hackers Hacked Samsung Galaxy S9, iPhone X, Xiaomi Mi6 & Got Reward $325,000

Tianfu Cup 2018 PWN – Ethical Hackers Hacked Apple, Adobe, Google, Microsoft, Oracle, VMware & Earned 1,000,000 USD

CarsBlues Bluetooth Hack Allows Hackers to Access Text Messages, Call Logs and More

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

New Microsoft 365 Attack Leverages OAuth Redirection for Credential Theft

Threat researchers at Proofpoint are currently tracking two sophisticated and highly targeted cyber-attack campaigns...

Decrypting Akira Ransomware on Linux/ESXi Without Paying Hackers

A team successfully decrypted an instance of the Akira ransomware on Linux/ESXi systems without...

New Cyber Attack Targets PyPI Users to Steal Cloud Tokens and Sensitive Data

A recent discovery by ReversingLabs researchers has unveiled a malicious cyber attack targeting the...

Blind Eagle Targets Organizations with Weaponized .URL Files to Steal User Hashes

APT-C-36, more commonly known as Blind Eagle, has intensified its operations targeting Colombian governmental,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Microsoft 365 Attack Leverages OAuth Redirection for Credential Theft

Threat researchers at Proofpoint are currently tracking two sophisticated and highly targeted cyber-attack campaigns...

Decrypting Akira Ransomware on Linux/ESXi Without Paying Hackers

A team successfully decrypted an instance of the Akira ransomware on Linux/ESXi systems without...

New Cyber Attack Targets PyPI Users to Steal Cloud Tokens and Sensitive Data

A recent discovery by ReversingLabs researchers has unveiled a malicious cyber attack targeting the...