Wednesday, May 1, 2024

Two Young Hackers Jailed For Hacking TalkTalk that Costs £77million

Two young hackers jailed for their roles in a hack attack on TalkTalk which hit 157,000 accounts and costs £77million.

Matthew Hanley, 23, who hacked the site in 2015 and stolen personal and financial information of more than 156,000 customers and he handed the details to 21-year-old friend Connor Allsopp and he sold the data for another online user for fraud.

The Judge Anuja Dhir QC jailed Hanley for 12 months and his friend Allsopp for eight months. Judge Dhir said it was a tragedy to find ‘two individuals of such extraordinary talent’ reported Dailymail.

The hack attack allows other to gain access to the confidential information of TalkTalk’s clients and the total estimated loss is about £77 million.

The stolen personal information including the company customers’ full names, postal addresses, dates of birth, telephone numbers, email addresses and in most cases attackers accessed financial information also.

Hanley admitted hacking into TalkTalk and shared the financial and personal information of more than 8,000 customers to Allsopp and another online user.

Allsopp admitted he involved in the selling of TalkTalk customers’data to online users and other files for hacking.

Daniel Kelley, 19 was arrested for trying to blackmail TalkTalk CEO and demanded 465 bitcoins. Following the hack TalkTalk CEO subjected to a number of blackmail attempts.

TalkTalk is one of the telecommunication company in the UK, between 15 and 21 of October 2015 hackers exploited an SQL injection vulnerability and extracted data using the automated SQLmap tool.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Pwn2Own – Ethical Hackers Hacked Samsung Galaxy S9, iPhone X, Xiaomi Mi6 & Got Reward $325,000

Tianfu Cup 2018 PWN – Ethical Hackers Hacked Apple, Adobe, Google, Microsoft, Oracle, VMware & Earned 1,000,000 USD

CarsBlues Bluetooth Hack Allows Hackers to Access Text Messages, Call Logs and More

Website

Latest articles

Google Guide! How to Detect Browser Data Theft Using Windows Event Logs

In the ever-evolving cybersecurity landscape, Google is continually striving to protect user data from...

Millions of Malicious “Imageless” Docker Hub Repositories Drop Malware

In a startling revelation, nearly 20% of Docker Hub repositories have been identified as...

Attackers Leverage Sidecar Container Injection Technique To Stay Stealthy

Kubernetes (K8s) is an open-source container orchestration platform designed to automate application container deployment,...

How to Utilize Azure Logs to Identify Threats: Insights From Microsoft

Microsoft's Azure platform is a highly acclaimed and widely recognized solution that organizations worldwide...

Redline Malware Using Lua Bytecode to Challenge the SOC/TI Team to Detect

The first instance of Redline using such a method is in a new variant...

Threat Actor Claims Selling of Dell Database with 49M User Records

A threat actor reportedly sells a database containing 49 million user records from Dell,...

Google Blocks 2.28M Malicious Apps Entering The Play Store

A safe and trusted Google Play experience is our top priority.We leverage our...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

WAAP/WAF ROI Analysis

Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles