TalkTalk Hacker Jailed

The hacker behind the 2015 TalkTalk cyber-attack in the UK has been sentenced to 4 years. The attack cost the company £77 million (€86.3 million) after the personal details of 157,000 customers were stolen. A twenty-two year old, Daniel Kelley, from Llanelli, South Wales, became a "Black Hat" hacker when he failed to get the GCSE grades to get on to a computer course.

He hacked his college "out of spite" before targeting companies in Canada, Australia and the UK, including a telecommunications giant with four million customers. He has admitted to targeting at least six organisations by threatening to sell their hacked data on the dark web unless they paid him hundreds of thousands of pounds in Bitcoin. When they refused, he made good on his threats. 

The 22-year-old has Asperger's syndrome and has suffered from depression and extreme weight loss since he pleaded guilty to 11 hacking-related offences in 2016.

TalkTalk Attack
In October 2015, Kelley was one of many hackers who used software called ‘SQL injection’ to attack TalkTalk, whose then-chief executive Dido Harding was subjected to repeated extortion attempts demanding £80,000 (€89,715) in Bitcoin in exchange for stolen customer data. Investigations revealed details relating to 156,959 accounts were accessed, of which 15,656 had their bank account and sort code numbers accessed.

Kelley advertised this data for sale at $1,450,000 (€1,281,372) on a dark web site called dbs4sale. TalkTalk lost £42 million as a direct result of the attack and £35 million in other costs, including the loss of 95,000 customers. In another blackmail campaign, Kelley spent weeks hounding Australian firm For The Record for cash in return for not making its stolen customer data public. 

Fearing for its reputation, the company made several payments totalling 26.65 Bitcoin. However, Kelley continued to demand more from a marketing director at the firm, telling him in messages: “I could annihilate your company in days.” On 13 May 2015, the employee received an email from Kelley containing a picture of his 18-month-old son with a message reading: “How fun would it be find your son’s background ruined online, before he has even hit 10?”

The message, a clear threat to modify the child’s picture for sexual purposes, came alongside a series of menacing phone calls.

Other Attacks
In an early example of his hacking, Kelley also attacked a college near his hometown in revenge for tutors refusing him a place on a BTEC computer course because he had not passed enough GCSEs. Throughout 2013 and 2014, Coleg Dir Gar in south-west Wales was subjected to repeated ‘Distributed Denial of Service’ attacks. The disruption cost students hundreds of hours of teaching time and affected other parts of the Welsh public sector broadband network, costing a minimum of £399,000 (€447,438) in taxpayers’ money to mitigate.

Describing themselves as Team Hans, Kelley also encouraged and coached two accomplices to hack Canada’s Rogers Communications and send threatening messages to one of its employees. At an earlier hearing at the Old Bailey, Kelley pleaded guilty to blackmail charges involving a further three companies.

“Daniel Kelley is an opportunistic and utterly ruthless hacker who, motivated by financial gain and spite, caused enormous financial and reputational damage to his victims,” Russell Tyner, CPS specialist prosecutor, said.

“Far from showing mercy to the distressed employees of the companies he targeted, it is clear he took a vindictive pleasure in the anxiety and suffering his bullying inflicted on them.”

CPS Case
Kelley operated largely via an anonymous browsing network known as ‘the Onion Router’ and had also disguised his IP address, which made detecting his criminal activities extremely difficult. However, the Crown Prosecution Service was able to prove his culpability after examining evidence hidden in his digital devices, including chat logs and Bitcoin accounts.

Other files found on his computer included thousands of credit card numbers and details of the holders. Software and other tools designed to assist or enable hacking were also recovered from his computer, including SQLi tools which allow for rapid scanning of the entire internet.

“Hidden behind a cloak of anonymity, Kelley thought he could act with impunity by targeting companies worldwide he thought were vulnerable to cyber-attack,” Tyner said.

“Indeed he saw himself as a coach and mentor to his fellow hackers. But, working with colleagues in Canada and Australia, the CPS was able to piece together the many complex strands of evidence, which resulted in Kelley pleading guilty to 11 offences.”

Kelley pleaded guilty at the Old Bailey in December 2016 to 11 offences and he e has now been sentenced to four years in a youth detention centre.

The Journal:       Telegraph

You Might Also Read: 

TalkTalk Penalised With A Record Fine:

 

« The Spycraft Revolution
Be Prepared for Tomorrow’s Cyber Threat »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Secure Thingz

Secure Thingz

Secure Thingz focus on developing and delivering advanced security solutions into the emerging Industrial Internet of Things (IIoT) and Critical Infrastructure markets.

Trapezoid

Trapezoid

Trapezoid is a cybersecurity company developing Firmware Integrity Management solutions designed to detect unauthorized changes to firmware & BIOS across the entire data center infrastructure.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Measured Insurance

Measured Insurance

Measured Insurance are bridging the gap between technology and Insurance using AI-Powered analytics that track clients’ exposure in real time to create smarter insurance products.

Two Six Technologies

Two Six Technologies

Two Six Technologies delivers R&D, innovation, productization and implementation expertise in cyber, data science, mobile, microelectronics and information operations.

BlackhawkNest

BlackhawkNest

Blackhawk is the only cyber security solution on the market that combines network monitoring and incident response into a cohesive appliance.

Regulativ.ai

Regulativ.ai

Regulativ.ai is an innovative and comprehensive platform, driven by AI, to address the regulatory and compliance needs of Cyber Security Regulatory compliance and reporting.

MAXXeGUARD Data Safety

MAXXeGUARD Data Safety

MAXXeGUARD: The High Security Shredder. MAXXeGUARD easily destroys hard disks up to the highest security levels as well as other digital data carriers like SSD’s, LTO’s, USB’s, CD’s etc.

AMSYS Innovative Solutions

AMSYS Innovative Solutions

AMSYS is a full-service, 24/7/365 IT solutions, Cybersecurity & Managed Service Provider.

Inspectiv

Inspectiv

Inspectiv offers a turn-key solution to continuously identify security vulnerabilities and provide security assurance.

Phriendly Phishing

Phriendly Phishing

Phriendly Phishing offers phishing awareness training programs designed to ward off potential security threats and minimise the impact of cyber attacks.

Varutra Consulting

Varutra Consulting

Varutra Consulting is an Cyber Security Consulting, Solutions and Training services firm, providing specialized security services for software, mobile and network.

Chestnut Hill Technologies (CHT)

Chestnut Hill Technologies (CHT)

CHT provide Best Practices IT Cybersecurity and Technology Solutions and Consulting Support to the Mid Cap through Fortune 1000 Nationwide.

Methods

Methods

Methods is the leading digital transformation partner for the UK public sector. We care deeply about making our public services better and have been doing this for over 28 years.

Vault Cloud

Vault Cloud

Vault Cloud, Australia's National Cloud, is an Australian owned and operated company specialising in secure, sovereign, hyperscale cloud infrastructure.

Athena7

Athena7

Athena7 is a dedicated assessment practice committed to helping organizations understand how their infrastructure, backups, and security controls will withstand the latest threat actor tactics.