DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

UK: Alex Bessell, 21, sentenced to two years in jail after admitting to numerous Computer Misuse Act offenses

Posted on January 18, 2018 by Dissent

A hacker who was responsible for thousands of cyber-attacks on firms around the world including Skype and Google has been jailed for two years.

Alex Bessell, 21, from Liverpool, was sentenced at Birmingham Crown Court today (18 January) after admitting to a number of offences under the Computer Misuse Act on 4 December at the same court.

Alex Bessell. Credit: West Midlands Police.

He was also convicted of various other offences, including money laundering, which were linked to the hacks.

As well as the cyber-attacks, Bessell was responsible for creating programmes for sale allowing others across the globe to conduct Distributed Denial of Service (DDoS) attacks and steal data.

Bessell (dob 13.09.1996) pleaded guilty to the following charges at Birmingham Crown Court on 4 December:

  • Two counts of: Doing an unauthorised act or acts with intent to impair, or with recklessness as to impairing the operation of a computer or computers, contrary to section 3 of the Computer Misuse Act 1990;
  • One count of: Unauthorised access with intent, contrary to section 2 of the Computer Misuse Act 1990;
  • Two counts of: Conspiracy to make an article for use in offences under Section 3 of the Computer Misuse Act 1990, contrary to section 1 (1) of the Criminal Law Act 1997;
  • One count of: Entering into or becoming concerned in a money laundering arrangement, contrary to section 328 (1) of the Proceeds of Crime Act 2002;
  • One count of: acquiring criminal property, contrary to section 329 (1) (a) of the Proceeds of Crime Act 2002;
  • Three counts of: conspiracy to make or supply an article for use in offences under section 3 of the Computer Misuse Act 1990, contrary to section 1 (1) of the Criminal Law Act 1997; and
  • One court of: Encouraging or assisting offences, contrary to section 46 of the Serious Crime Act 2007.

When police raided his home, his computer was found to hold 750 names and passwords from infected computers. It also held two programmes which are designed to infect computers and retrieve email, banking and log-in details from a web data form before passing it over the internet to a secure server.

He created an online marketplace and sold both his and others’ malware products which enabled users to spread viruses.

These included remote administration tools, denial of service packages, programmes to bypass anti-virus software and other malicious programmes. He took a cut of the sales and his earnings from cyber-crime exceeded US$50,000.

Bessell’s site advertised 9,077 items and it had 1,000,000 recorded visitors with over 34,000 sales.

He registered the company using a false address to give it a legitimate company status.

Bessell was arrested following an investigation by West Midlands police’s Cyber Regional Organised Crime Unit.

As part of his sentence, he was also given a Serious Crime Prevention Order.

Hannah Sidaway, for the Crown Prosecution Service, said: “Bessell was responsible for the creation, use and distribution of computer malware from 2010 onwards – during which time law enforcement have seen this type of criminality grow at a phenomenal rate.

“His actions enabled others across the world to commit thousands of criminal attacks. Such activity can result in the compromising of personal data, extortion, loss of valuable data or work, loss of custom for businesses and a high cost to rectify the damage sustained.

“Bessell’s arrest and prosecution was a result of a lengthy and complex police operation, which spanned several countries and involved the collection and analysis of detailed data to identify him.  The CPS provided investigative advice to the police at an early stage to ensure a case was built that could lead to his charging and eventual prosecution.”

Source:  Crown Prosecution Service

Category: HackNon-U.S.Of Note

Post navigation

← New data breach reporting rules will help prevent cyber crime, say IT experts
A second Indiana hospital reports ransomware attack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Alleged Geisinger hacker will defend himself pro se.
  • Tallahassee Memorial Healthcare reveals it was also impacted by Cerner/Legacy Oracle cyberattack
  • Hospital cyberattack investigation complete, no formal review needed
  • Largest Ever Seizure of Funds Related to Crypto Confidence Scams
  • IMPACT: 170 patients harmed as a result of Qilin’s ransomware attack on NHS vendor Synnovis
  • DOJ’s Data Security Program: Key Compliance Considerations for Impacted Entities
  • UBS reports data leak after cyber attack on provider, client data unaffected
  • Scania confirms insurance claim data breach in extortion attempt
  • Cybersecurity takes a big hit in new Trump executive order
  • Episource notifying 5.4 million patients of cyberattack in January

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • DOJ’s Data Security Program: Key Compliance Considerations for Impacted Entities
  • 23andMe fined £2.31 million for failing to protect UK users’ genetic data
  • DOJ Seeks More Time on Tower Dumps
  • Your household smart products must respect your privacy – including your air fryer
  • Vermont signs Kids Code into law, faces legal challenges
  • Data Categories and Surveillance Pricing: Ferguson’s Nuanced Approach to Privacy Innovation
  • Anne Wojcicki Wins Bidding for 23andMe

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.