DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

UK man charged over attack on Mumsnet

Posted on May 25, 2016 by Dissent

There’s been an arrest in the attacks on parenting site Mumsnet. Charlie Osborne reports:

A British man has been charged in connection to a cyberattack against Mumsnet which knocked the popular parenting website offline.

Mumsnet experienced a data breach earlier this year when a hacker broke into the website’s servers and exploited administration privileges to redirect the site to a Twitter account which posted messages such as “RIP Mumsnet” and “Our DDoS attacks are keeping you offline,” as well as launch distributed denial-of-service (DDoS) attacks against the domain.

Read more on ZDNet.

The Metropolitan Police Cyber Crime Unit issued the following release on May 23:

The Met’s Cyber Crime Unit (MPCCU) has charged a man with three offences under the Computer Misuse Act. 

[A] David Gerrard Buchanan, 18 (25.02.98) of Vann Road, Haslemere, Surrey was charged on Saturday, 21 May with two counts of causing a computer to perform a function to secure / enable unauthorised access to a programme / data, contrary to section 1 of the Computer Misuse Act 1990 and also one count of unauthorised acts with intent to impair operation of or prevent / hinder access to a computer, contrary to section 3 of the Computer Misuse act 1990.

The charges relate to various incidents of computer intrusion and damage to network profiles following attacks on systems controlled by the website Mumsnet and others between July and August 2015.

Buchanan was bailed to appear at Guildford Magistrates’ Court on Tuesday, 7 June.

The MPCCU continues to investigate this incident. Anyone with information is encouraged to contact police via 101 or Crimestoppers anonymously on 0800 555 111 or by visiting crimestoppers-uk.org/give-information/give-information-online

Anyone concerned around cyber crime and fraud can seek online assistance from www.getsafeonline.org or www.actionfraud.police.uk

Two 17-year-old boys [B] and [C] were interviewed under caution in relation to the above incident, they have both been eliminated from the inquiry with no further action being taken.


Related:

  • KR: Privacy Commissioner’s Office Urges the Public to Beware of Fraudsters Exploiting the Tai Po Fire Disaster
  • Cyber attack on Indian airports? Govt explains the scary threat that disrupted 400 flights last month.
  • KR: Hacking scheme targeted 120,000 home cameras for sexual footage
  • GreyNoise launches free scanner to check if you're part of a botnet
  • HHS OCR Seeks Questions About HIPAA Security Rule Risk Management Requirement
  • John P. Meehan Agency was hacked in July 2024. Affected customers were first finding out in November 2025.
Category: HackMiscellaneousNon-U.S.Other

Post navigation

← Probable security breach may have compromised thousands of Lewis Palmer students’ data
Austrian Firm Fires CEO After $56-million Business Email Compromise Scam →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Marquis data breach impacts over 74 US banks, credit unions
  • Virginia Twins Arrested for Conspiring to Destroy Government Databases
  • Cyberattack on Puerto Rico IT vendor Truenorth hits 3 agencies
  • Easy Question, Complicated Answer: What Does It Take to Stop Workers From Snooping?
  • Update on Dos-OP’s report on Nova RaaS
  • KR: Privacy Commissioner’s Office Urges the Public to Beware of Fraudsters Exploiting the Tai Po Fire Disaster
  • Cyber attack on Indian airports? Govt explains the scary threat that disrupted 400 flights last month.
  • How a noisy ransomware intrusion exposed a long-term espionage foothold
  • KR: Hacking scheme targeted 120,000 home cameras for sexual footage
  • GreyNoise launches free scanner to check if you’re part of a botnet

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • EU justice chief draws red line on privacy reforms
  • Kaiser Permanente to Pay Up to $47.5M in Web Tracker Lawsuit
  • How Palantir shifted course to play key role in ICE deportations
  • U.S. Judge Blocks Trump From Cutting Medicaid Funding For Planned Parenthood In 22 States
  • India backs off mandatory ‘cyber safety’ app after surveillance backlash

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.