Infracore LLC Blog

Perpetrators of Three Major Cyber Crimes Have Pled Guilty

Perpetrators of Three Major Cyber Crimes Have Pled Guilty

Every so often, it’s nice to hear about when the good guys win and cybercriminals get their comeuppance. Three such cybercriminals have entered guilty pleas to charges related to major cybersecurity events.

Mirai was a malware strain that creates a botnet out of enslaved Internet of Things devices. By leveraging the resources of these IoT devices, Mirai took down networks and websites. 20 and 21-year-olds Josiah White and Paras Jha have pled guilty for developing and leveraging Mirai.

The duo were co-founders of Protraf Solutions LLC, a company that would mitigate DDoS attacks. Their business model was to sell their solutions to their DDoS victims, or use the DDoS attack the old-fashioned way: as a means of collecting ill-gotten monies from those desperate enough to pay them to stop the attack. Along with 21-year-old Dalton Norman, White and Jha also used Mirai to power a click fraud scheme that net them about 200 Bitcoin, Norman alone netting 30.

Mirai ultimately went on to power one of the biggest attacks the world has ever seen, using IoT devices to take down Dyn, causing many major websites to go down.

Ultimately, the three young malware developers were each charged with click fraud conspiracy, earning each a $250,000 fine and a stay of up to five years in prison. Jha and White plead guilty to conspiracy charges for writing and using Mirai and were each sentenced to an additional 5 years in prison and $250,000 fine, as well as three years of supervised release.

NSA Data
An employee of the National Security Agency, Nghia Hoang Pho, pled guilty on December 17, 2017, to a charge of “willful retention of national defense information.” According to the United States Justice Department, Pho was hired in 2006 as a developer for the Tailored Access Operations unit. The Tailored Access Operations unit, or TAO unit, creates specialized hacking tools that are used to collect data from the information systems used by overseas targets.

Between 2010 and March of 2015, Pho removed classified data and stored it on his home computer, which utilized antivirus software from Kaspersky Lab. Kaspersky Lab is suspected of having been exploited by Russian hackers to steal documents, perhaps including the ones Pho removed and saved at home.

The United States Department of Homeland Security has since issued a directive that bans the use of Kaspersky software in federal agencies. Pho could face up to 10 years in prison and is scheduled for sentencing on April 6.

One of four men who faced indictment in March of 2017 has pled guilty to hacking into Yahoo and exposing the usernames, passwords, and account information for essentially every Yahoo user, with the number of victims counting to about one billion.

22-year-old Karim Baratov, a Canadian, has been charged with working for two members of the Federal Security Service of the Russian Federation. In his work for the FSB, Baratov hacked into 80 accounts, as well as a total of over 11,000 webmail accounts since 2010. Baratov also provided hacking services that enabled access to accounts with Google, Yahoo, and Yandex, via the use of spear-phishing through custom content and a malicious link.

For his activities, Baratov has pled guilty to a total of nine counts. One count, for aggravated identity theft, has a mandatory sentence of two years, while each of the other eight counts could net him 10 years in jail and a fine of $250,000. However, the federal sentencing guidelines established in the United States could reduce the final sentence considerably.

While it is nice to see those responsible for cybercrime paying their dues, it is even better to prevent certain cybercrimes in the first place. If you feel your business might not have the safety measures in place to properly protect you and your organization from cybercriminals, a good strategy could be to partner with a reputable and trusted IT services firm to conduct a comprehensive security audit. 

Tip of the Week: The Internet of Things Poses Thre...
Upgrading Your Technology? Be Careful of What You ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, October 20 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business computing Network Security Hackers Google Malware Microsoft Software Innovation Data Internet Tech Term Hardware Backup Smartphones Email Browser Windows 10 Hosted Solutions Business Continuity Business Computer Android Mobile Devices VoIP Alert Workplace Tips Data Backup IT Services Managed IT Services Small Business User Tips Miscellaneous Communications Smartphone Office Business Management Ransomware Cloud Computing Outsourced IT Productivity Computers Disaster Recovery Efficiency Artificial Intelligence Data Recovery Communication Law Enforcement Cybercrime Windows 10 Windows Telephone Systems How To Productivity Money Network Chrome Collaboration Passwords Cybersecurity Router Social Media Internet of Things Managed IT Services Password Applications Facebook Virtualization Upgrade Work/Life Balance Health Server App Social Engineering Gadgets Office 365 Quick Tips Saving Money Save Money Data Protection Apps Holiday Information Mobile Device Management Keyboard HaaS Two-factor Authentication Office Tips Phishing IT Support Scam Data Breach Connectivity Word Microsoft Office Private Cloud IT Support Data Security Hacking Wi-Fi Google Drive Automation Vulnerability Spam Bring Your Own Device Data Management USB Value End of Support BYOD History Data Storage Firewall Networking Mobile Device Content Management OneNote Marketing Paperless Office Employer-Employee Relationship Charger IT Management Business Intelligence Redundancy Avoiding Downtime Patch Management Blockchain PDF Spam Blocking Battery Managed Service Update Identity Theft Cleaning Infrastructure IT Plan Encryption Virtual Assistant Remote Computing Managed Service Provider Operating System Worker Big Data Government Telephone System Computer Care Unsupported Software Sports VPN Flexibility Remote Monitoring Legal Managed IT Public Cloud Fraud Samsung Electronic Medical Records BDR Mobility Automobile Training Comparison Bandwidth Windows 7 Website CES Settings Entertainment Skype Gmail Emails Document Management Telecommuting Leadership Vendor Management Google Apps Information Technology Specifications Solid State Drive Techology Flash Users Cryptocurrency Meetings Travel Content Remote Worker Emergency Voice over Internet Protocol Apple Public Computer Frequently Asked Questions Servers Bluetooth Amazon Web Services Nanotechnology Start Menu Troubleshooting Recovery Loyalty Recycling Internet exploMicrosoft Search Save Time Remote Work Practices Workers Addiction Instant Messaging Wireless Internet Warranty Smart Technology Current Events Digital Signature Audit Virtual Reality Safe Mode Video Games Audiobook Wiring iPhone Excel HVAC Online Shopping Smart Tech Tools SaaS eWaste Advertising IT solutions Physical Security How to Machine Learning Hosted Computing Experience Relocation User Error Cache Wire Printer Two Factor Authentication Millennials Knowledge Computer Fan Sync Worker Commute Data loss Unified Threat Management Multi-Factor Security HIPAA Tip of the week Education Enterprise Content Management Risk Management Evernote Downtime MSP Criminal Black Market YouTube Hiring/Firing Credit Cards Monitor Inventory Music Password Manager webinar Mouse Workforce Network Congestion The Internet of Things Wireless Charging Devices Screen Mirroring Scalability Mobile Computing Transportation Trending Safety Human Resources Windows 10s Windows Server 2008 Computing Infrastructure Password Management Politics Rootkit Root Cause Analysis File Sharing Books Google Docs Assessment HBO Employer Employee Relationship Access Control Wearable Technology Humor Business Mangement Internet Exlporer Conferencing Wireless Software Tips Smart Office IT Consultant Accountants FENG Telephony Cortana Files Thought Leadership Cast Camera Benefits Staff NIST Best Practice Botnet Augmented Reality Television Hybrid Cloud Outlook Computer Accessories Amazon Data storage Authentication Regulation Twitter Printers Webinar Thank You CrashOverride Congratulations WiFi Company Culture Compliance Administrator Managing Stress

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

JeffreyKGuertin Tech Term: Modems and Routers Defined
18 October 2018
Thank you so much for defining here the modems and routers to give us better information about this....
Shay Stuart How the Convenience of The Internet of Things Can Come Back to Bite Us
17 October 2018
This is a very important share that delivers facts about the utilization of internet tools in differ...
Isla Tait It Pays to Outsource Your IT
15 October 2018
New IT project that show us a new outcome that has been to prepare this setup that was god to know o...
ClarenceEHaynes 11 Ways to Enhance Android Security
15 October 2018
I really impressed from your working, after reading this 11 ways to enhance android security and dis...
technicalsupport VoIP Delivers Benefits That a Traditional Phone System Can’t
13 October 2018
http://Www.Office.Com/Setup | Microsoft http://Office.Com/Setup :- Office setup suite is an importan...