DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

UK: 21 arrests in nationwide cyber crackdown; customers of WeLeakInfo targeted

Posted on December 25, 2020 by Dissent

From the UK’s National Crime Agency (NCA):

21 people have been arrested across the UK as part of an operation targeting customers of an online criminal marketplace that advertised stolen personal credentials.

The operation, which ran over the past five weeks, was coordinated by the National Crime Agency and involved cybercrime teams from across the Team Cyber UK network.

Those targeted were customers of WeLeakInfo, a site that hosted 12 billion stolen credentials from over 10,000 data breaches before it was taken down in January 2020 following an NCA investigation.

Cyber criminals paid for access to the site in order to download personal data for use in further criminality, including cyber attacks and fraud offences.

NCA investigators identified UK-based customers of WeLeakInfo and shared the intelligence with partners ahead of the coordinated period of activity launching on 16 November.

Of those 21 arrested – all men aged between 18-38 – nine were detained on suspicion of Computer Misuse Act offences, nine for Fraud offences and three are under investigation for both.

NCA officers conducted 11 of the arrests and seized over £41,000 in bitcoin.

As well as being customers of WeLeakInfo, evidence suggests that some had also purchased other cybercrime tools such as remote access Trojans (RATs) and crypters.

Additionally, three subjects have been found to be in possession of, or involved with, indecent images of children.

A further 69 individuals in England, Wales and Northern Ireland aged between 16-40 were visited by Cyber Prevent officers, warning them of their potentially criminal activity. 60 of those were served with cease and desist notices.

Many more of these visits are due to take place over the coming months.

Paul Creffield, from the NCA’s National Cyber Crime Unit, said: “Through the identification of UK customers of WeLeakInfo, we were able to locate and arrest those who we believe have used stolen personal credentials to commit further cyber and fraud offences.

“The NCA and UK law enforcement take such offences extremely seriously and they can result in huge financial loss to victims.

“We were also able to pin point those on the verge of breaking the law and warn them that should they continue, they could face a criminal conviction. Cyber skills are in huge demand and there are great prospects in the tech industry for those who choose to use their skills legally.

“Cyber criminals rely on the fact that people duplicate passwords on multiple sites and data breaches create the opportunity for fraudsters to exploit that.

“Password hygiene is therefore extremely important. Advice on this and guidance on how to mitigate against cyber attacks can be found on the National Cyber Security Centre’s website – www.ncsc.gov.uk”

The NCA and UK policing’s Cyber Choices programme aims to prevent young people inadvertently slipping into cyber crime and divert them to more positive pathways in tech.

For further information visit cyberchoices.uk

25 December 2020

Source: National Crime Agency

Related posts:

  • FBI seizes WeLeakInfo, a website that sold access breached data
  • RaidForums seized in Operation TOURNIQUET; forum’s administrator and two accomplices arrested
  • WeLeakInfo.to and Related Domain Names Seized
Category: Of Note

Post navigation

← Riverside Community Care notifies clients of October ransomware attack
RU: Freedom Finance admits data leak of 16,000 clients →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report
  • Texas Centers for Infectious Disease Associates Notifies Individuals of Data Breach in 2024
  • Battlefords Union Hospitals notifies patients of employee snooping in their records
  • Alert: Scattered Spider has added North American airline and transportation organizations to their target list
  • Northern Light Health patients affected by security incident at Compumedics; 10 healthcare entities affected
  • Privacy commissioner reviewing reported Ontario Health atHome data breach
  • CMS warns Medicare providers of fraud scheme
  • Ex-student charged with wave of cyber attacks on Sydney uni
  • Detaining Hackers Before the Crime? Tamil Nadu’s Supreme Court Approves Preventive Custody for Cyber Offenders
  • Potential Cyberattack Scrambles Columbia University Computer Systems

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report
  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina
  • European Commission publishes its plan to enable more effective law enforcement access to data
  • Sacred Secrets: The Biblical Case for Privacy and Data Protection
  • Microsoft’s Departing Privacy Chief Calls for Regulator Outreach

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.