Perpetrators of Three Major Cyber Crimes Have Pled Guilty

Perpetrators of Three Major Cyber Crimes Have Pled Guilty

Every so often, it’s nice to hear about when the good guys win and cybercriminals get their comeuppance. Three such cybercriminals have entered guilty pleas to charges related to major cybersecurity events.

Mirai was a malware strain that creates a botnet out of enslaved Internet of Things devices. By leveraging the resources of these IoT devices, Mirai took down networks and websites. 20 and 21-year-olds Josiah White and Paras Jha have pled guilty for developing and leveraging Mirai.

The duo were co-founders of Protraf Solutions LLC, a company that would mitigate DDoS attacks. Their business model was to sell their solutions to their DDoS victims, or use the DDoS attack the old-fashioned way: as a means of collecting ill-gotten monies from those desperate enough to pay them to stop the attack. Along with 21-year-old Dalton Norman, White and Jha also used Mirai to power a click fraud scheme that net them about 200 Bitcoin, Norman alone netting 30.

Mirai ultimately went on to power one of the biggest attacks the world has ever seen, using IoT devices to take down Dyn, causing many major websites to go down.

Ultimately, the three young malware developers were each charged with click fraud conspiracy, earning each a $250,000 fine and a stay of up to five years in prison. Jha and White plead guilty to conspiracy charges for writing and using Mirai and were each sentenced to an additional 5 years in prison and $250,000 fine, as well as three years of supervised release.

NSA Data
An employee of the National Security Agency, Nghia Hoang Pho, pled guilty on December 17, 2017, to a charge of “willful retention of national defense information.” According to the United States Justice Department, Pho was hired in 2006 as a developer for the Tailored Access Operations unit. The Tailored Access Operations unit, or TAO unit, creates specialized hacking tools that are used to collect data from the information systems used by overseas targets.

Between 2010 and March of 2015, Pho removed classified data and stored it on his home computer, which utilized antivirus software from Kaspersky Lab. Kaspersky Lab is suspected of having been exploited by Russian hackers to steal documents, perhaps including the ones Pho removed and saved at home.

The United States Department of Homeland Security has since issued a directive that bans the use of Kaspersky software in federal agencies. Pho could face up to 10 years in prison and is scheduled for sentencing on April 6.

One of four men who faced indictment in March of 2017 has pled guilty to hacking into Yahoo and exposing the usernames, passwords, and account information for essentially every Yahoo user, with the number of victims counting to about one billion.

22-year-old Karim Baratov, a Canadian, has been charged with working for two members of the Federal Security Service of the Russian Federation. In his work for the FSB, Baratov hacked into 80 accounts, as well as a total of over 11,000 webmail accounts since 2010. Baratov also provided hacking services that enabled access to accounts with Google, Yahoo, and Yandex, via the use of spear-phishing through custom content and a malicious link.

For his activities, Baratov has pled guilty to a total of nine counts. One count, for aggravated identity theft, has a mandatory sentence of two years, while each of the other eight counts could net him 10 years in jail and a fine of $250,000. However, the federal sentencing guidelines established in the United States could reduce the final sentence considerably.

While it is nice to see those responsible for cybercrime paying their dues, it is even better to prevent certain cybercrimes in the first place. If you feel your business might not have the safety measures in place to properly protect you and your organization from cybercriminals, a good strategy could be to partner with a reputable and trusted IT services firm to conduct a comprehensive security audit. 



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, August 16 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business computing Google Software Microsoft Malware Network Security Backup Hackers Hardware Innovation Windows 10 Internet Data Tech Term Business Android Email Smartphones Hosted Solutions Business Continuity VoIP Managed IT Services Alert Small Business Browser Cloud Computing Smartphone Office Ransomware Mobile Devices Outsourced IT Computers User Tips Disaster Recovery Business Management Data Backup Computer Miscellaneous Productivity IT Services Efficiency Cybercrime Law Enforcement Communications Network Data Recovery Artificial Intelligence Router Productivity Money Managed IT Services Passwords Social Media Telephone Systems Password How To Facebook Virtualization Chrome Collaboration Cybersecurity Windows Upgrade Communication App Health Office 365 Gadgets Internet of Things Social Engineering Work/Life Balance Quick Tips HaaS Phishing Office Tips IT Support Data Security Word Two-factor Authentication IT Support Microsoft Office Bring Your Own Device Connectivity Hacking Vulnerability Wi-Fi Spam Windows 10 Holiday Private Cloud Applications Mobile Device Management Google Drive Workplace Tips Automation Apps Data Breach Saving Money Data Protection Big Data Content Management End of Support IT Plan Operating System History Battery Computer Care Server Business Intelligence Blockchain Unsupported Software Identity Theft Remote Computing Electronic Medical Records Update Remote Monitoring Samsung PDF Bandwidth Infrastructure Managed IT Information Paperless Office Entertainment Flexibility Windows 7 Save Money USB Value Managed Service Provider Legal Networking VPN Government Mobility Automobile BYOD Employer-Employee Relationship Data Storage Keyboard Charger BDR Patch Management OneNote Comparison Public Cloud Data Management Redundancy Website CES IT Management Mobile Device Spam Blocking Avoiding Downtime Cleaning Scam Marketing Worker Amazon Web Services Nanotechnology Instant Messaging Computer Fan Sync Smart Office Hiring/Firing Voice over Internet Protocol Virtual Reality Remote Work Practices Video Games Audiobook Tip of the week Network Congestion Recovery Recycling Data loss NIST Music Transportation Safety Workers Addiction How to Downtime Politics Rootkit Digital Signature Apple Books Assessment Online Shopping Smart Tech The Internet of Things Document Management Employer Employee Relationship Internet exploMicrosoft Worker Commute webinar Hosted Computing Windows 10s Windows Server 2008 IT Consultant eWaste Education Screen Mirroring Cryptocurrency Wearable Technology iPhone HBO Benefits Cache Black Market Root Cause Analysis Servers Training Millennials Encryption Television Evernote FENG Telephony Computer Accessories Multi-Factor Security HIPAA Advertising Conferencing Software Tips Credit Cards Inventory Scalability Wireless Internet Leadership Criminal Relocation User Error Computing Infrastructure Cast Safe Mode Settings Outlook Firewall Password Manager Botnet HVAC Vendor Management Workforce Managed Service Emergency Public Computer Wireless Charging Devices Monitor Wireless Skype Machine Learning Bluetooth Trending Human Resources Emails Fraud Access Control Solid State Drive Flash Wire Save Time Google Docs Virtual Assistant Troubleshooting Loyalty Best Practice Frequently Asked Questions Smart Technology Current Events Business Mangement Meetings Travel Enterprise Content Management Accountants MSP Cortana Thought Leadership Start Menu YouTube Staff Amazon Authentication Information Technology Audit Sports Humor Internet Exlporer Techology Users Telephone System SaaS Content Excel Two Factor Authentication Knowledge Gmail Files Password Management Experience Telecommuting IT solutions Physical Security File Sharing Google Apps Data storage Search Tools Risk Management Specifications Hybrid Cloud Compliance Augmented Reality Managing Stress Regulation Thank You Congratulations WiFi Webinar Twitter CrashOverride Company Culture

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

JeffereyANoah 5 Useful Cloud Apps for Small Businesses
15 August 2018
Sharing these type stuff is very useful and hope you will provide us more like this one. I come here...
Jared Albert VoIP Delivers Benefits That a Traditional Phone System Can’t
13 August 2018
A traditional telephone system is installed for the happiness of the people. Majority of the concern...
Meredith Maddox Tip of the Week: Tip of the Week: Mirror or Cast Your Android Device’s Screen
08 August 2018
Android mobile phones are top of the list now a days every one wants to buy android phone. It’s a bi...
MarianneJCruz Tip of the Week: Got a Solid State Drive? Here’s How to Take Care of It
31 July 2018
What a review
Digital Hold The Case for Hosting Your Phone Solution In-House
24 February 2018
Informative Blog. Thanks a lot for the useful info.