Feeds

UK man charged with attack that shut down SOCA site

Investigation of Ryan Cleary continues

The Essential Guide to IT Transformation

UK officials have formally accused a 19-year-old man of involvement in Monday's attack on the website of the British Serious Organised Crime Agency and two previous web-based assaults directed at the music industry.

Ryan Cleary was charged with five offenses in all, according to a press release issued Wednesday by the Metropolitan Police. He was arrested Monday night and has remained in police custody pending an investigation into any involvement he had in various high-profile DDoS, or distributed denial-of-service, attacks.

According to police, the Wickford teenager was involved in the DDoS attack on the SOCA website that prompted authorities to temporarily shut it down. The site contained only publicly available information. He also stands accused of participating in similar assaults in October and November against the British Phonographic Industry (BPI) and the International Federation of the Phonographic Industry (IFPI) respectively.

Two additional charges accuse him of helping to construct a botnet for the purposes of mounting DDoS attacks and supplying a botnet to assist in the commission of unspecified offenses.

Cleary was arrested by officers from Scotland Yard, but according to The Telegraph, the investigation into his alleged offenses is “being driven by the FBI.”

The LulzSec hacker collective claimed responsibility for taking down the SOCA website. It has also taken credit for several other attacks, including one that briefly disrupted the website for the Central Intelligence Agency. Although it's impossible to substantiate the claims, speculation has run rampant that Cleary was involved in that attack and possibly a much larger list of computer crimes.

Web searches yield a variety of webpages and online forums that make a variety of serious claims about Cleary. Few if any of them can be independently confirmed. He is scheduled to appear at the City of Westminster Magistrates' Court on Thursday.

Separately, claims from earlier this week that LulzSec stole sensitive UK census data has been labeled a hoax. Which just goes to show that unsubstantiated claims made online can't be taken seriously. ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Tor attack nodes RIPPED MASKS off users for 6 MONTHS
Traffic confirmation attack bared users' privates - but to whom?
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.