Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Serial Hacker Jailed for Hacking and Defacing Organizations’ Websites

Posted on August 20, 2025August 20, 2025 By CWS

A classy cybercriminal operation concentrating on authorities establishments and personal organizations throughout a number of continents has culminated within the sentencing of Al-Tahery Al-Mashriky, a 26-year-old hacker from Rotherham, South Yorkshire.

The prolific attacker, who operated beneath a number of aliases throughout the extremist hacking collective “Yemen Cyber Military,” was sentenced to twenty months imprisonment after pleading responsible to 9 offences beneath the Pc Misuse Act.

Al-Mashriky’s marketing campaign of digital disruption spanned from 2022 by way of his arrest, concentrating on high-profile entities together with the Yemen Ministry of International Affairs, Yemen Ministry of Safety Media, Israeli Reside Information, faith-based web sites throughout North America, and demanding infrastructure websites such because the California State Water Board.

His methodology centered on exploiting low-security internet purposes, the place he would achieve unauthorized administrative entry earlier than deploying reconnaissance instruments to enumerate extra vulnerabilities and consumer credentials.

The size of Al-Mashriky’s operations grew to become obvious when he boasted on cybercrime boards about compromising over 3,000 web sites inside a three-month interval in 2022.

NCA analysts recognized the hacker’s connection to the Yemen Cyber Military by way of digital forensics evaluation of his seized units, revealing a trove of stolen credentials affecting over 4 million Fb customers alongside login credentials for premium companies together with Netflix and PayPal.

Assault Vector Evaluation and Persistence Mechanisms

Forensic examination of Al-Mashriky’s digital infrastructure revealed a scientific method to web site infiltration that prioritized amount over sophistication.

His assault methodology concerned scanning goal web sites for widespread vulnerabilities, notably specializing in unpatched content material administration techniques and weak authentication mechanisms.

As soon as preliminary entry was achieved, Al-Mashriky would escalate privileges to administrative ranges, enabling him to control web site content material and set up persistent backdoors.

The hacker’s signature method concerned creating hid webpages embedded with ideological messaging and private identifiers, reworking compromised web sites into propaganda platforms.

Within the case of Israeli Reside Information, investigators found that Al-Mashriky had downloaded the whole web site database after gaining administrative entry, demonstrating the potential for large-scale information exfiltration.

His scanning instruments systematically catalogued usernames and system vulnerabilities, creating detailed reconnaissance profiles for future exploitation campaigns.

Deputy Director Paul Foster of the NCA’s Nationwide Cyber Crime Unit emphasised the investigation’s significance in demonstrating regulation enforcement’s functionality to trace refined cybercriminals throughout worldwide boundaries, noting that such operations trigger substantial operational disruption to focused organizations whereas enabling potential fraud in opposition to hundreds of thousands of people.

Enhance your SOC and assist your workforce defend your online business with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Defacing, Hacker, Hacking, Jailed, Organizations, Serial, Websites

Post navigation

Previous Post: North Korea Uses GitHub in Diplomat Cyber Attacks as IT Worker Scheme Hits 320+ Firms
Next Post: Scaly Wolf Attacking Organizations to Uncover Organizations’ Secrets

Related Posts

Microsoft Outlook Users Face Crashes When Creating New Emails, Temp Fix Issued Cyber Security News
Threat Actors Exploiting Ivanti Connect Secure Vulnerabilities to Deploy Cobalt Strike Beacon Cyber Security News
25 Best Managed Security Service Providers (MSSP) Cyber Security News
Apache Tomcat Coyote Vulnerability Let Attackers Trigger DoS Attack Cyber Security News
KongTuke Attacking Windows Users With New Interlock RAT Variant Using FileFix Technique Cyber Security News
Auditing Data Access Controls for Privacy Regulation Adherence Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Flaws in Software Used by Hundreds of Cities and Towns Exposed Sensitive Data
  • Turning BIA Insights Into Resilient Recovery
  • Scaly Wolf Attacking Organizations to Uncover Organizations’ Secrets
  • Serial Hacker Jailed for Hacking and Defacing Organizations’ Websites
  • North Korea Uses GitHub in Diplomat Cyber Attacks as IT Worker Scheme Hits 320+ Firms

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Flaws in Software Used by Hundreds of Cities and Towns Exposed Sensitive Data
  • Turning BIA Insights Into Resilient Recovery
  • Scaly Wolf Attacking Organizations to Uncover Organizations’ Secrets
  • Serial Hacker Jailed for Hacking and Defacing Organizations’ Websites
  • North Korea Uses GitHub in Diplomat Cyber Attacks as IT Worker Scheme Hits 320+ Firms

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News