Now Reading
British Lizard Squad Suspect Arrested Among 56 Hackers

British Lizard Squad Suspect Arrested Among 56 Hackers

by P. H. MadoreMarch 8, 2015

Those pesky lizards who thought they were untouchable? Well, for the second time, British law enforcement has arrested one of them. Or so they suspect.

In an operation that lasted about a week and was dubbed “strike week,” twenty-five different stings were carried out across the British Isles, netting a total of up to 56 arrests, reports the BBC. Among them was a sixteen-year-old (go figure) with strong ties to the Lizard Squad. In mid-January, we reported that an eighteen-year-old had been arrested in Southport, UK. In the meantime, Lizard Squad has done anything but scale back their operations, hacking Google Vietnam and Lenovo, and remaining as pestiferous as ever.

The arrests were conducted under the direction of Britain’s National Crime Agency and included the co-operation of local police agencies in every case. But the Lizard Squad wasn’t the only group to get a bit disruption in this sweep.

Another prominent suspect arrested was allegedly an active member of D33Ds Company, the group that orchestrated a dump of nearly half a million Yahoo! Passwords way back in 2012. The hacker would have been a teenager at the time, which seems to be a recurring theme in the profiles of these widely-known, very annoying hacking incidents. Serious, mature hackers tend to work for the government or criminal enterprises and have a lot loftier targets in mind than the Sony Playstation Network or the e-mail accounts of random strangers. They don’t do it for notoriety and certainly don’t make mistakes that will get them caught, like launching a website to sell nefarious services.

US Agencies Supplied Valuable Data

Much of the data that helped the NCA conduct the raids was supplied by the FBI (likely in conjunction with the NSA) and the Department of Defense. Another of the suspects arrested was a 23-year-old man believed to have been involved in a June, 2014 attack on the DoD, where non-confidential user data was compromised, and US satellite systems were breached.

Other arrests were lower-profile though one man had netted roughly $22,000 in phishing attacks. Another was allegedly a developer and distributor of popular malware; none of which was named specifically by the arresting agencies. Actual details such as names are hard to come by due to British privacy laws, but after court cases are conducted, details sometimes emerge.

Here’s a video of one of the raids.


Advertised sites are not endorsed by us. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
What's your reaction?
Love it
Hate it