Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Serial Hacker Jailed for Hacking and Defacing Organizations’ Websites

Serial Hacker Jailed for Hacking and Defacing Organizations’ Websites

Posted on August 20, 2025August 20, 2025 By CWS

A classy cybercriminal operation concentrating on authorities establishments and personal organizations throughout a number of continents has culminated within the sentencing of Al-Tahery Al-Mashriky, a 26-year-old hacker from Rotherham, South Yorkshire.

The prolific attacker, who operated beneath a number of aliases throughout the extremist hacking collective “Yemen Cyber Military,” was sentenced to twenty months imprisonment after pleading responsible to 9 offences beneath the Pc Misuse Act.

Al-Mashriky’s marketing campaign of digital disruption spanned from 2022 by way of his arrest, concentrating on high-profile entities together with the Yemen Ministry of International Affairs, Yemen Ministry of Safety Media, Israeli Reside Information, faith-based web sites throughout North America, and demanding infrastructure websites such because the California State Water Board.

His methodology centered on exploiting low-security internet purposes, the place he would achieve unauthorized administrative entry earlier than deploying reconnaissance instruments to enumerate extra vulnerabilities and consumer credentials.

The size of Al-Mashriky’s operations grew to become obvious when he boasted on cybercrime boards about compromising over 3,000 web sites inside a three-month interval in 2022.

NCA analysts recognized the hacker’s connection to the Yemen Cyber Military by way of digital forensics evaluation of his seized units, revealing a trove of stolen credentials affecting over 4 million Fb customers alongside login credentials for premium companies together with Netflix and PayPal.

Assault Vector Evaluation and Persistence Mechanisms

Forensic examination of Al-Mashriky’s digital infrastructure revealed a scientific method to web site infiltration that prioritized amount over sophistication.

His assault methodology concerned scanning goal web sites for widespread vulnerabilities, notably specializing in unpatched content material administration techniques and weak authentication mechanisms.

As soon as preliminary entry was achieved, Al-Mashriky would escalate privileges to administrative ranges, enabling him to control web site content material and set up persistent backdoors.

The hacker’s signature method concerned creating hid webpages embedded with ideological messaging and private identifiers, reworking compromised web sites into propaganda platforms.

Within the case of Israeli Reside Information, investigators found that Al-Mashriky had downloaded the whole web site database after gaining administrative entry, demonstrating the potential for large-scale information exfiltration.

His scanning instruments systematically catalogued usernames and system vulnerabilities, creating detailed reconnaissance profiles for future exploitation campaigns.

Deputy Director Paul Foster of the NCA’s Nationwide Cyber Crime Unit emphasised the investigation’s significance in demonstrating regulation enforcement’s functionality to trace refined cybercriminals throughout worldwide boundaries, noting that such operations trigger substantial operational disruption to focused organizations whereas enabling potential fraud in opposition to hundreds of thousands of people.

Enhance your SOC and assist your workforce defend your online business with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Defacing, Hacker, Hacking, Jailed, Organizations, Serial, Websites

Post navigation

Previous Post: North Korea Uses GitHub in Diplomat Cyber Attacks as IT Worker Scheme Hits 320+ Firms
Next Post: Scaly Wolf Attacking Organizations to Uncover Organizations’ Secrets

Related Posts

New Ghost Tapped Attack Uses Your Android Device to Drain Your Bank Account New Ghost Tapped Attack Uses Your Android Device to Drain Your Bank Account Cyber Security News
Hackers Breaking Internet with 7.3 Tbps and 4.8 Billion Packets Per Second DDoS Attack Hackers Breaking Internet with 7.3 Tbps and 4.8 Billion Packets Per Second DDoS Attack Cyber Security News
NVIDIA’s Isaac-GROOT Robotics Platform Vulnerability Let Attackers Inject Malicious Codes NVIDIA’s Isaac-GROOT Robotics Platform Vulnerability Let Attackers Inject Malicious Codes Cyber Security News
Starbucks Phishing Attack Compromises Employee Data Starbucks Phishing Attack Compromises Employee Data Cyber Security News
Microsoft Exchange Online Service Down Microsoft Exchange Online Service Down Cyber Security News
Microsoft Confirms Laying Off 9,000 Employees, Impacting 4% of its Workforce Microsoft Confirms Laying Off 9,000 Employees, Impacting 4% of its Workforce Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark