Feeds

UK cybercops cuff abortion clinic web hack suspect

Info leak threat after site vandalised

Internet Security Threat Report 2014

Cybercrime cops have arrested a bloke suspected of hacking into and defacing the website of Britain's largest abortion provider.

The British Pregnancy Advisory Service (BPAS) site was compromised on Thursday by a hacker using the handle Pablo Escobar, who claimed an affiliation to the Anonymous hacktivist group.

Escobar boasted of extracting the names of women who had sought pregnancy counselling or other sexual health advice through the service - and threatened to release the data. The BPAS said the leaked data only involved details of people who had contacted the service and no medical information was taken. It added that it was the target of "about 26,000 attempts" to break into its website over a six-hour period.

Officers from the Police Central e-Crime Unit (PeCU) arrested the unnamed 27-year-old suspect in Wednesbury, West Midlands, on Friday. Detectives confirmed that the BPAS website was vandalised and "data compromised", but stressed that no medical or personal information regarding women who have received treatment at the service was obtainable.

Police said the man, who was held on suspicion of offences under the Computer Misuse Act and quizzed at a West Midlands cop shop, claimed to have links to Anonymous.

Detective Inspector Mark Raymond from the MPS PeCU said: "We have taken rapid action to identify and arrest a suspect involved in hacking. This was done to prevent personal details of people who had requested information from the BPAS website being made public. It should be stressed that the stolen data did not contain the medical details of women who had received treatment or why individuals had contacted the British Pregnancy Advisory Service." ®

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.