British Teenagers Convicted for Involvement in Hacking Group “Lapsus$”

In a recent trial, two British teenagers have been convicted of various computer crimes, blackmail, and fraud, all of which were carried out as core members of the notorious adolescent hacking group, Lapsus$. This article delves into the charges faced by the teenagers, specific allegations against them, the impact of mental health on the trial, the jury’s verdict, details about their involvement in Lapsus$ attacks, the background of the hacking group, their tactics and behavior, as well as the techniques employed by Lapsus$ in their cyberattacks.

Overview of charges

The two teenagers faced charges related to schemes that involved gaining remote access to corporate networks, social engineering, and SIM swapping. These activities demonstrate the extent to which the teenagers were involved in sophisticated cybercriminal operations.

Specific allegations

One of the teenagers, aged 17, was accused of hacking into the City of London Police servers. This allegation, if proven, highlights the severity of their offense and the potential consequences of their actions.

Mental health issues

In a significant turn of events, psychiatrists deemed one of the teenagers, who has autism, as unfit to stand trial. This diagnosis raises questions about the role of mental health in cybercrime cases and the implications it may have for judicial proceedings.

Jury verdict

After more than nine hours of deliberations, the jury unanimously found that one of the teenagers had committed all 12 offenses with which he had been charged. This verdict reflects the compelling evidence presented against the teenager and underscores the seriousness of his actions.

Conviction details

The 17-year-old teenager, who is also autistic, was convicted of participating in multiple Lapsus$ attacks. His involvement in the group’s activities showcases the depth of their engagement in cybercriminal endeavors.

Lapsus Group Background

Lapsus$, apparently based not only in the UK but also in Brazil, gained prominence through its relentless cyberattacks from late 2021 through late 2022. These attacks compromised numerous well-resourced organizations, leaving a trail of destruction in their wake.

Group’s tactics and behavior

Notorious for their boldness, Lapsus$ regularly boasted about their attacks and taunted their victims. In some instances, they went as far as posting graphic images on the internal sites of targeted organizations, causing distress among employees. Such behavior underscores the audacity and callousness of the group.

Attack Techniques

Despite their reputation, Lapsus$ primarily employed simple techniques to gain access to companies and their proprietary data. These included stealing cellphone numbers and employing phishing methods to exploit employees. The group’s success using these tactics reveals that even rudimentary strategies can yield devastating results.

The conviction of these British teenagers for their involvement in the hacking group Lapsus$ highlights the ever-increasing threat posed by cybercriminals. The case demonstrates the need for robust cybersecurity measures to protect organizations and individuals from such attacks. Additionally, it prompts a larger discussion around the appropriate handling of individuals with mental health conditions who engage in cybercrime. As the repercussions of this trial resonate, it remains to be seen how it will shape future cybercrime trials and the global fight against hacking groups like Lapsus$.

Explore more

Is Leadership Fear Undermining Your Team?

A critical paradox is quietly unfolding in executive suites across the industry, where an overwhelming majority of senior leaders express a genuine desire for collaborative input while simultaneously harboring a deep-seated fear of soliciting it. This disconnect between intention and action points to a foundational weakness in modern organizational culture: a lack of psychological safety that begins not with the

Save Hours Weekly With Minor Workflow Changes

With decades of experience helping organizations navigate change through technology, HRTech expert Ling-yi Tsai has a unique perspective on a universal challenge: the never-ending to-do list. She argues that the secret to reclaiming our time isn’t about massive, complex system overhauls but rather a series of small, intelligent workflow adjustments. In our conversation, we explore how to eliminate the daily

Review of Crypto Trading Platforms

Defining the Ideal Platform for the Modern Indian Trader The once-fledgling Indian cryptocurrency market has blossomed into a sophisticated arena where the conversation has decisively shifted from ‘which coins to buy’ to ‘which platform provides a true competitive edge’. This review guides Indian Bitcoin (BTC) and Ethereum (ETH) traders through the process of selecting an optimal trading platform. The primary

Insurers Now Mandate Smart Leak Detection

The landscape of home insurance is undergoing a significant transformation, driven by a surprising and costly reality that has eclipsed even the risk of fire in terms of financial losses. Non-weather-related water damage, often stemming from slow, hidden leaks, has become the leading cause of property claims, compelling the insurance industry to pivot from a traditional, reactive model of compensating

SAP Patches Critical Code Injection Flaw in S/4HANA

A single vulnerability hidden within a core enterprise application can unravel an organization’s entire security posture, and SAP’s latest security bulletin underscores this reality with alarming clarity. This is not just another monthly cycle of software maintenance; the February 2026 Security Patch Day is a critical call to action for enterprises worldwide. With 26 new Security Notes, the bulletin addresses