British 'Dark Overlord' hacker jailed for five years in the US
Nathan Wyatt is the only member of the prolific hacking group to be identified
A British man has been sentenced to five years in prison for stealing information from several US companies as part of The Dark Overlord hacking group.
Nathan Francis Wyatt, a 39-year-old from Northamptonshire, pleaded guilty to conspiring to commit aggravated identity theft and computer fraud in a federal court in St Louis.
Wyatt, the only member of the group to have been identified, set up a phone account and Twitter and PayPal profiles that were used to communicate and receive money. He was ordered to pay about $1.5 million in restitution fees.
The Dark Overlord stole medical records, client files and personal information from companies, then demanded between $75,000 and $300,000 worth of Bitcoin to return the information, according to federal prosecutor Laura Kathleen Bernstein.
The group has been linked to a spate of attacks in both the US and UK and often threaten to release stolen data on the dark web if their demands are not paid.
Wyatt's actions helped the other hackers remain anonymous, according to Bernstein, and his phone account was used to send threatening text messages to relatives of victims. Although none of the victims paid the ransom, they did lose money due to the intrusion and subsequent release of stolen data.
During his Zoom hearing, Wyatt apologised and said that his mental health problems were the reason for his bad decisions, according to The St.Louis Post-Dispatch.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"I can promise you that I'm out of that world," he said. "I don't want to see another computer for the rest of my life."
In an unrelated case, Wyatt was arrested in 2016 by police investigating the hacking of an iCloud account that belonged to Pippa Matthews - the sister of the Duchess of Cambridge. Wyatt was released with no further action in September 2017. He has, however, served 14 months in a British prison for hacking and fraud offences.
Bobby Hellard is ITPro's Reviews Editor and has worked on CloudPro and ChannelPro since 2018. In his time at ITPro, Bobby has covered stories for all the major technology companies, such as Apple, Microsoft, Amazon and Facebook, and regularly attends industry-leading events such as AWS Re:Invent and Google Cloud Next.
Bobby mainly covers hardware reviews, but you will also recognize him as the face of many of our video reviews of laptops and smartphones.
-
Instructure chose to a pay ransom following the Canvas cyber attack – research shows more than half of security leaders would follow suitAnalysis Opting to pay ransoms creates huge risks for enterprises – you’re relying on the word of criminals
-
Ransomware negotiator sentenced for role in major cyber crime groupNews Deniss Zolotarjovs was a key player in a group associated with Conti
-
Threat actors ditch ‘spray and pray’ attacks in shift to targeted exploitationNews A dip in ransomware volumes points to a more targeted approach focused on vulnerability exploitation
-
Security leaders overconfident about ransomware recoveryNews Few manage to recover all their data, and many experience business disruption
-
German authorities want your help finding the hackers behind GandCrab and REvilNews Daniil Maksimovich Shchukin and Anatoly Sergeevitsch Kravchuk are believed to have made millions from ransomware as a service schemes
-
The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in lifeNews With family responsibilities and mortgages to pay, it's not teenagers dishing out malware or carrying out cyber extortion
-
Ransomware gangs are using employee monitoring software as a springboard for cyber attacksNews Two attempted attacks aimed to exploit Net Monitor for Employees Professional and SimpleHelp
-
Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoingNews Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos

