DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

UK: Alex Bessell, 21, sentenced to two years in jail after admitting to numerous Computer Misuse Act offenses

Posted on January 18, 2018 by Dissent

A hacker who was responsible for thousands of cyber-attacks on firms around the world including Skype and Google has been jailed for two years.

Alex Bessell, 21, from Liverpool, was sentenced at Birmingham Crown Court today (18 January) after admitting to a number of offences under the Computer Misuse Act on 4 December at the same court.

Alex Bessell. Credit: West Midlands Police.

He was also convicted of various other offences, including money laundering, which were linked to the hacks.

As well as the cyber-attacks, Bessell was responsible for creating programmes for sale allowing others across the globe to conduct Distributed Denial of Service (DDoS) attacks and steal data.

Bessell (dob 13.09.1996) pleaded guilty to the following charges at Birmingham Crown Court on 4 December:

  • Two counts of: Doing an unauthorised act or acts with intent to impair, or with recklessness as to impairing the operation of a computer or computers, contrary to section 3 of the Computer Misuse Act 1990;
  • One count of: Unauthorised access with intent, contrary to section 2 of the Computer Misuse Act 1990;
  • Two counts of: Conspiracy to make an article for use in offences under Section 3 of the Computer Misuse Act 1990, contrary to section 1 (1) of the Criminal Law Act 1997;
  • One count of: Entering into or becoming concerned in a money laundering arrangement, contrary to section 328 (1) of the Proceeds of Crime Act 2002;
  • One count of: acquiring criminal property, contrary to section 329 (1) (a) of the Proceeds of Crime Act 2002;
  • Three counts of: conspiracy to make or supply an article for use in offences under section 3 of the Computer Misuse Act 1990, contrary to section 1 (1) of the Criminal Law Act 1997; and
  • One court of: Encouraging or assisting offences, contrary to section 46 of the Serious Crime Act 2007.

When police raided his home, his computer was found to hold 750 names and passwords from infected computers. It also held two programmes which are designed to infect computers and retrieve email, banking and log-in details from a web data form before passing it over the internet to a secure server.

He created an online marketplace and sold both his and others’ malware products which enabled users to spread viruses.

These included remote administration tools, denial of service packages, programmes to bypass anti-virus software and other malicious programmes. He took a cut of the sales and his earnings from cyber-crime exceeded US$50,000.

Bessell’s site advertised 9,077 items and it had 1,000,000 recorded visitors with over 34,000 sales.

He registered the company using a false address to give it a legitimate company status.

Bessell was arrested following an investigation by West Midlands police’s Cyber Regional Organised Crime Unit.

As part of his sentence, he was also given a Serious Crime Prevention Order.

Hannah Sidaway, for the Crown Prosecution Service, said: “Bessell was responsible for the creation, use and distribution of computer malware from 2010 onwards – during which time law enforcement have seen this type of criminality grow at a phenomenal rate.

“His actions enabled others across the world to commit thousands of criminal attacks. Such activity can result in the compromising of personal data, extortion, loss of valuable data or work, loss of custom for businesses and a high cost to rectify the damage sustained.

“Bessell’s arrest and prosecution was a result of a lengthy and complex police operation, which spanned several countries and involved the collection and analysis of detailed data to identify him.  The CPS provided investigative advice to the police at an early stage to ensure a case was built that could lead to his charging and eventual prosecution.”

Source:  Crown Prosecution Service

Category: HackNon-U.S.Of Note

Post navigation

← New data breach reporting rules will help prevent cyber crime, say IT experts
A second Indiana hospital reports ransomware attack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • B.C. health authority faces class-action lawsuit over 2009 data breach (1)
  • Private Industry Notification: Silent Ransom Group Targeting Law Firms
  • Data Breach Lawsuits Against Chord Specialty Dental Partners Consolidated
  • PA: York County alerts residents of potential data breach
  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.