Brit Accused of Bank Cyber Attacks

A man accused of launching cyber-attacks against two of the UK's largest banks has appeared in court.

Daniel Kaye allegedly targeted Lloyds Banking Group and Barclays in January. The three-day attack prevented Lloyds, Halifax and Bank of Scotland customers using some online accounts, after the banks refused to pay a ransom.

Mr Kaye, 29, of Egham, Surrey, was extradited from Germany and appeared before Westminster magistrates earlier. The attack featured distributed denial of service assaults - where multiple infected computers bombard a system to overwhelm its security and access information. He is said to have developed malicious software enabling him to take control of computers all over the world - known as creating a botnet.

Boasted

It is estimated it cost Lloyds £190,000 to get its internet services back online, while Barclays paid about £146,000 to get its systems fully up and running again.

In one email to a potential client, Mr Kaye allegedly boasted he had between 555,000 and 1.5 million computers in his botnet, the court heard.

He faces nine charges under the Computer Misuse Act, two of blackmail and one of possession of criminal property. One of the charges also relates to an allegation he "endangered human welfare" by carrying out a cyber-attack against Lonestar MTN, the largest internet provider in Liberia, west Africa.

Mr Kaye, who has British and Israeli citizenship, was extradited under a European Arrest Warrant following an investigation involving the National Crime Agency's German counterpart the Bundeskriminalamt. Listing his case for a plea and case management hearing on 28 September at Blackfriars Crown Court, District Judge Tan Ikram remanded him in custody until that date.

A Lloyds spokeswoman said the January attack was "successfully defended" and no customer details or accounts were compromised.

BBC:

You Might Also Read: 

Big Hack At Tesco Bank – Money Vanished:

Tesco Could Have Been Facing £2bn Fine After The Bank Hack:

« The IoT Will Bring Cyberwar Close To Home
WikiLeaks: The Biter Bit »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Eversheds Sutherland

Eversheds Sutherland

Eversheds Sutherland is a global multinational law practice offering a full range of commercial and IT law services including Privacy, Data Protection and Cyersecurity.

Cato Networks

Cato Networks

Cato connects your branch locations, physical and cloud datacenters, and mobile users into a secure and optimized global network in the cloud.

LogonBox Software

LogonBox Software

LogonBox Software specialises in producing a cost-effective range of Network Security and Identity Management software solutions for all sizes of Enterprise.

Grimm Cyber

Grimm Cyber

GRIMM makes the world a more secure place by increasing the cyber resiliency of our client’s systems, networks, and products.

OneSpan

OneSpan

OneSpan (formerly Vasco Data Security) is a global leader in digital identity security, transaction security and business productivity.

Seqrite

Seqrite

Seqrite offers a highly advanced range of enterprise and IT security solutions to protect your organization's most critical data.

Cyber Security Malta

Cyber Security Malta

Cyber Security Malta is part of Malta's National Cyber Security Strategy which aims to combat cybercrime, strengthen national cyber defence and provide cyber security awareness and education.

Gorodissky IP Security

Gorodissky IP Security

Gorodissky IP Security is a comprehensive approach to protecting your intellectual property on the Internet and beyond.

Neovera

Neovera

Neovera is a trusted provider of managed services including cyber security and enterprise cloud solutions, committed to delivering results through the innovative use of scalable enterprise-grade tech.

SAM Seamless Network

SAM Seamless Network

SAM Seamless Network is a cybersecurity technology platform that protects the connected home, by tackling cyber security threats at the source.

UK Cyber Cluster Collaboration (UKC3)

UK Cyber Cluster Collaboration (UKC3)

UKC3 has been launched to support Cyber Clusters and encourage greater collaboration across regions and nations of the UK.

Mercury Systems

Mercury Systems

Mercury Systems is the leader in making trusted, secure mission-critical technologies profoundly more accessible to aerospace and defense.

ProvenRun

ProvenRun

ProvenRun is a leading provider of trusted software solutions with extensive expertise and an unwavering commitment to security.

Windstream

Windstream

Windstream is a leading provider of advanced network communications and technology solutions for consumers, small businesses, enterprise organizations and carrier partners across the US.

Canary Technology Solutions (Canary IT)

Canary Technology Solutions (Canary IT)

A Cloud, Cyber Security, Retail Solutions and Managed IT Services provider for over 25 years, we safeguard and revolutionise business through technology and foresight.

Dark Entry

Dark Entry

Dark Entry provide solutions to safeguard businesses, leveraging advanced technologies and intelligence-driven approaches to detect and mitigate risks associated with compromised data.