{"id":3507,"date":"2013-05-30T05:39:28","date_gmt":"2013-05-29T21:39:28","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=3507"},"modified":"2015-09-09T19:36:54","modified_gmt":"2015-09-09T11:36:54","slug":"four-former-lulzsec-members-sentenced-to-prison-in-the-uk","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2013\/05\/four-former-lulzsec-members-sentenced-to-prison-in-the-uk\/","title":{"rendered":"4 Former LulzSec Members Sentenced To Prison Time In The UK"},"content":{"rendered":"

It’s been a while since we’ve talked about any hacking related arrests, or in this case, imprisonments. In this case, it’s some ‘ex’ members of LulzSec<\/a>, for the attacks they perpetrated in 2011.<\/p>\n

The longest of the sentences being 32 months, almost 3 years for the guy that operated and managed the botnet used in some of the LulzSec<\/a> attacks.<\/p>\n

I wonder if all these successful prosecutions can be attributed to the former LulzSec leader, Sabu, who flipped and informed for the FBI<\/a>.<\/p>\n

Four British men associated with the LulzSec hacker collective received prison sentences Thursday for their roles in cyberattacks launched by the group against corporate and government websites in 2011.<\/p>\n

Ryan Cleary, 21, Jake Davis, 20, Ryan Ackroyd, 26, and Mustafa Al-Bassam, 18, were sentenced Thursday in London’s Southwark Crown Court after previously pleading guilty to charges of carrying out unauthorized acts with the intention of impairing the operation of computers.<\/p>\n

Davis, who was known online as “Topiary,” received a two-year prison sentence. He acted as a spokesperson for LulzSec, writing some of the hacker group’s announcements and managing its website and Twitter account.<\/p>\n

Ackroyd, who posed as a 16-year-old girl online and used the alias “Kayla,” received a 30-month prison sentence, while Mustafa al-Bassam, who used the online alias “T-Flow,” received a 20-month suspended prison sentence and was ordered to perform 200 hours of unpaid community work.<\/p>\n

Cleary, who used the online alias “Viral,” received a 32-month prison sentence. He was not one of the LulzSec core members, but was associated with the group and operated a botnet that was used to launch DDoS (distributed denial-of-service) attacks against LulzSec’s targets.<\/p>\n

LulzSec’s members went on a hacking spree between May and June 2011, targeting various companies and government agencies. They used hacking methods and tools to break into websites and leak the information found in their databases, including the personal details of thousands of users, and also launched DDoS attacks to make websites inaccessible. <\/p><\/blockquote>\n

The attacks carried out were fairly widespread and included major corporations as well as US and UK governmental organizations. Data was captured and leaked and large scale sustained DDoS<\/a> sustained were used against prominent sites.<\/p>\n

We are still in a fairly immature legal situation for cyberattacks, so we tend to see sentences vary a lot. I’m pretty sure these guys will end up in some cushy white collar prison rather than in with hardcore criminals.<\/p>\n