Sunday, July 14, 2024

UK Police Arrests 17-Yr-Old Teen Hacker Believed to be Behind Uber & Rockstar Hacks

A British 17-year-old teen has been detained recently (Thursday 22 September 2022) by the City of London Police in connection with recent cyberattacks that have been reported by authorities. While this arrest was officially announced by London Police on Twitter.

The National Crime Agency of the UK supported the hacking investigation that led to the arrest of the teen in Oxfordshire. There have been no further details released so far about the nature of the investigation by the law enforcement agencies.

The recent high-profile hacks were mainly aimed at:-

  • Uber 
  • Rockstar Games

Lapsus$ has been linked to the arrest

Upon investigation, it is believed that both intrusions were perpetrated by the same threat actor, known as TeaPots (aka teapotuberhacker), who has allegedly committed both intrusions.

There is a suspicion that the arrest may have been linked to the Lapsus$ hacking group. Recently, there have been several cyberattacks on the following big players that are suspected to be the work of this group:-

  • Uber
  • Rockstar Games
  • 2K

Likewise, Uber believes that the breach was the result of an attacker affiliated with the LAPSUS$ extortion gang, which they believe is behind the attack.

A threat actor named ‘White’ or ‘BreachBase’ was being reported to be behind last year’s Lapsus$ hacking group’s attacks, who was denounced as an allegedly 16-year-old teenage British boy tracked as a member of the hacking group.

A 17-year-old ringleader who is alleged to be the leader of the group was arrested by the City of London Police in April as well as seven other suspects aged 16 to 21.

While it has been claimed that on an online dark forum the actual identity of the hacker has been revealed. It is claimed by the admin of that forum that the person who allegedly hacked the following sites is “teapotuberhacker”:-

  • Microsoft
  • Doxbin

While here’s what the Journalist Matthew Keys Tweeted:-

Since the suspect is a minor, so, law enforcement is prohibited from releasing their name according to the law of the UK.

Cyber Attack with Zero Trust Networking – Download Free E-Book


Latest articles

mSpy Data Breach: Millions of Customers’ Data Exposed

mSpy, a widely used phone spyware application, has suffered a significant data breach, exposing...

Advance Auto Parts Cyber Attack: Over 2 Million Users Data Exposed

RALEIGH, NC—Advance Stores Company, Incorporated, a prominent commercial entity in the automotive industry, has...

Hackers Using ClickFix Social Engineering Tactics to Deploy Malware

Cybersecurity researchers at McAfee Labs have uncovered a sophisticated new method of malware delivery,...

Coyote Banking Trojan Attacking Windows Users To Steal Login Details

Hackers use Banking Trojans to steal sensitive financial information. These Trojans can also intercept...

Hackers Created 700+ Fake Domains to Sell Olympic Games Tickets

As the world eagerly anticipates the Olympic Games Paris 2024, a cybersecurity threat has...

Japanese Space Agency Spotted zero-day via Microsoft 365 Services

The Japan Aerospace Exploration Agency (JAXA) has revealed details of a cybersecurity incident that...

Top 10 Active Directory Management Tools – 2024

Active Directory Management Tools are essential for IT administrators to manage and secure Active...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles