8-month suspended sentence for script kiddie who DDoS'd Labour candidate in runup to 2019 UK general election

Now banned from using Tor or VPNs – and 'vanity' handles on social media


A British script kiddie who DDoS'd a Labour Party parliamentary candidate's website in the runup to the last general election has been banned from using the Tor browser.

Bradley Niblock, formerly the operator of the UGLegion Twitter account, pleaded guilty to two Computer Misuse Act crimes after being tracked down by Cumbria Police. He was sentenced at Crown Court earlier this week.

Niblock launched a DDoS assault against the website of a Labour Party candidate days before the 2019 general election, an event which press officers in central party HQ characterised as "sophisticated and large scale cyber-attacks". Instead of its usual 100 visitors a day, the site was crapflooded with 250,000 connection requests, overwhelming it and forcing election candidate Chris Altree to engage Cloudflare's DDoS mitigation service, the courts heard.

South Cumbria Magistrates' Court heard in May that 22-year-old Niblock was a "self-confessed computer geek" who was "posing" as UGLegion "to attract likes to his Twitter site," as reported by the North West Evening Mail.

UGLegion was a Twitter account which appeared to be vaguely affiliated with Lizard Squad, a gang of internet miscreants whose specialisms were digital graffiti and distributed denial-of-service (DDoS) attacks, as we reported when they were active in the mid-2010s.

Police eventually raided Niblock's home in early 2020. The @UGLegion Twitter account was handed over to police, his solicitor said, and is currently suspended.

When his phone was seized, investigators found it was logged into the Twitter account of Furness Academy. Solicitor Louise Gordon told magistrates on Niblock's behalf: "This was a case of Mr Niblock messing around on his computer. He came across Furness Academy's Twitter account. He put in a password and it worked."

Cumbria Police's Cyber and Digital Crime Unit also linked Niblock to an account that was sending menacing messages to a young woman via Snapchat after Niblock had been arrested and released under investigation for the DDoS attack. Those messages included screenshots edited to suggest the sender had access to her account.

Bradley Kai Hayden Niblock pleaded guilty to breaching section 1(1) and section 3(1) of the Computer Misuse Act 1990 and to sending malicious Snapchat messages in breach of section 127(1)(a) of the Communications Act 2003.

Magistrates committed him to Preston Crown Court for sentencing. There he received an eight-month prison sentence suspended for two years, a 200-hour community service order and a three year Criminal Behaviour Order.

That order bans Niblock from using Tor and any non-Tor browser in private browsing mode, acquiring malware "that would compromise another computer," acquiring any stressors or pentesting tools or using a VPN "or software designed to obfuscate the origin of the defendant's IP address connection to the internet." He must also let police rifle through his devices at will.

Additionally, Niblock is banned from signing up to social media platforms using "vanity names" unless these are "made available to the police for inspection on request" – and he is banned from deleting any "social media content" or profiles without police permission.

His Honour Judge Simon Medland QC, sentencing, said, in comments reported by the North West Evening Mail: "The effect [of the DDoS] was significant and had a big impact on Mr Altree's ability to campaign in a democratic election. The offence concerning the Furness Academy was a further example of your misuse of computer equipment."

The judge added: "While you were under investigation you launched a spiteful and hurtful attack on an innocent woman. It left her feeling scared."

Niblock is now said to be working as a web designer. ®

Similar topics


Other stories you might like

  • Prisons transcribe private phone calls with inmates using speech-to-text AI

    Plus: A drug designed by machine learning algorithms to treat liver disease reaches human clinical trials and more

    In brief Prisons around the US are installing AI speech-to-text models to automatically transcribe conversations with inmates during their phone calls.

    A series of contracts and emails from eight different states revealed how Verus, an AI application developed by LEO Technologies and based on a speech-to-text system offered by Amazon, was used to eavesdrop on prisoners’ phone calls.

    In a sales pitch, LEO’s CEO James Sexton told officials working for a jail in Cook County, Illinois, that one of its customers in Calhoun County, Alabama, uses the software to protect prisons from getting sued, according to an investigation by the Thomson Reuters Foundation.

    Continue reading
  • Battlefield 2042: Please don't be the death knell of the franchise, please don't be the death knell of the franchise

    Another terrible launch, but DICE is already working on improvements

    The RPG Greetings, traveller, and welcome back to The Register Plays Games, our monthly gaming column. Since the last edition on New World, we hit level cap and the "endgame". Around this time, item duping exploits became rife and every attempt Amazon Games made to fix it just broke something else. The post-level 60 "watermark" system for gear drops is also infuriating and tedious, but not something we were able to address in the column. So bear these things in mind if you were ever tempted. On that note, it's time to look at another newly released shit show – Battlefield 2042.

    I wanted to love Battlefield 2042, I really did. After the bum note of the first-person shooter (FPS) franchise's return to Second World War theatres with Battlefield V (2018), I stupidly assumed the next entry from EA-owned Swedish developer DICE would be a return to form. I was wrong.

    The multiplayer military FPS market is dominated by two forces: Activision's Call of Duty (COD) series and EA's Battlefield. Fans of each franchise are loyal to the point of zealotry with little crossover between player bases. Here's where I stand: COD jumped the shark with Modern Warfare 2 in 2009. It's flip-flopped from WW2 to present-day combat and back again, tried sci-fi, and even the Battle Royale trend with the free-to-play Call of Duty: Warzone (2020), which has been thoroughly ruined by hackers and developer inaction.

    Continue reading
  • American diplomats' iPhones reportedly compromised by NSO Group intrusion software

    Reuters claims nine State Department employees outside the US had their devices hacked

    The Apple iPhones of at least nine US State Department officials were compromised by an unidentified entity using NSO Group's Pegasus spyware, according to a report published Friday by Reuters.

    NSO Group in an email to The Register said it has blocked an unnamed customers' access to its system upon receiving an inquiry about the incident but has yet to confirm whether its software was involved.

    "Once the inquiry was received, and before any investigation under our compliance policy, we have decided to immediately terminate relevant customers’ access to the system, due to the severity of the allegations," an NSO spokesperson told The Register in an email. "To this point, we haven’t received any information nor the phone numbers, nor any indication that NSO’s tools were used in this case."

    Continue reading

Biting the hand that feeds IT © 1998–2021