Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Serial Hacker Jailed for Hacking and Defacing Organizations’ Websites

Serial Hacker Jailed for Hacking and Defacing Organizations’ Websites

Posted on August 20, 2025August 20, 2025 By CWS

A classy cybercriminal operation concentrating on authorities establishments and personal organizations throughout a number of continents has culminated within the sentencing of Al-Tahery Al-Mashriky, a 26-year-old hacker from Rotherham, South Yorkshire.

The prolific attacker, who operated beneath a number of aliases throughout the extremist hacking collective “Yemen Cyber Military,” was sentenced to twenty months imprisonment after pleading responsible to 9 offences beneath the Pc Misuse Act.

Al-Mashriky’s marketing campaign of digital disruption spanned from 2022 by way of his arrest, concentrating on high-profile entities together with the Yemen Ministry of International Affairs, Yemen Ministry of Safety Media, Israeli Reside Information, faith-based web sites throughout North America, and demanding infrastructure websites such because the California State Water Board.

His methodology centered on exploiting low-security internet purposes, the place he would achieve unauthorized administrative entry earlier than deploying reconnaissance instruments to enumerate extra vulnerabilities and consumer credentials.

The size of Al-Mashriky’s operations grew to become obvious when he boasted on cybercrime boards about compromising over 3,000 web sites inside a three-month interval in 2022.

NCA analysts recognized the hacker’s connection to the Yemen Cyber Military by way of digital forensics evaluation of his seized units, revealing a trove of stolen credentials affecting over 4 million Fb customers alongside login credentials for premium companies together with Netflix and PayPal.

Assault Vector Evaluation and Persistence Mechanisms

Forensic examination of Al-Mashriky’s digital infrastructure revealed a scientific method to web site infiltration that prioritized amount over sophistication.

His assault methodology concerned scanning goal web sites for widespread vulnerabilities, notably specializing in unpatched content material administration techniques and weak authentication mechanisms.

As soon as preliminary entry was achieved, Al-Mashriky would escalate privileges to administrative ranges, enabling him to control web site content material and set up persistent backdoors.

The hacker’s signature method concerned creating hid webpages embedded with ideological messaging and private identifiers, reworking compromised web sites into propaganda platforms.

Within the case of Israeli Reside Information, investigators found that Al-Mashriky had downloaded the whole web site database after gaining administrative entry, demonstrating the potential for large-scale information exfiltration.

His scanning instruments systematically catalogued usernames and system vulnerabilities, creating detailed reconnaissance profiles for future exploitation campaigns.

Deputy Director Paul Foster of the NCA’s Nationwide Cyber Crime Unit emphasised the investigation’s significance in demonstrating regulation enforcement’s functionality to trace refined cybercriminals throughout worldwide boundaries, noting that such operations trigger substantial operational disruption to focused organizations whereas enabling potential fraud in opposition to hundreds of thousands of people.

Enhance your SOC and assist your workforce defend your online business with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Defacing, Hacker, Hacking, Jailed, Organizations, Serial, Websites

Post navigation

Previous Post: North Korea Uses GitHub in Diplomat Cyber Attacks as IT Worker Scheme Hits 320+ Firms
Next Post: Scaly Wolf Attacking Organizations to Uncover Organizations’ Secrets

Related Posts

U.S. Authorities Investigating Malicious Email Targeting Trade Talks with China U.S. Authorities Investigating Malicious Email Targeting Trade Talks with China Cyber Security News
Python-based PyRAT with Cross-Platform Capabilities and Extensive Remote Access Features Python-based PyRAT with Cross-Platform Capabilities and Extensive Remote Access Features Cyber Security News
Real-Time Threat Intelligence for Proactive Cyber Defense in 2025 Real-Time Threat Intelligence for Proactive Cyber Defense in 2025 Cyber Security News
New TokenBreak Attack Bypasses AI Model’s with Just a Single Character Change New TokenBreak Attack Bypasses AI Model’s with Just a Single Character Change Cyber Security News
IXON VPN Client Vulnerability Let Attackers Escalate Privileges IXON VPN Client Vulnerability Let Attackers Escalate Privileges Cyber Security News
Axis Communications Vulnerability Exposes Azure Storage Account Credentials Axis Communications Vulnerability Exposes Azure Storage Account Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark