(707) 268-8850    Get SUPPORT

Network Management Services Blog

Perpetrators of Three Major Cyber Crimes Have Pled Guilty

Perpetrators of Three Major Cyber Crimes Have Pled Guilty

Every so often, it’s nice to hear about when the good guys win and cybercriminals get their comeuppance. Three such cybercriminals have entered guilty pleas to charges related to major cybersecurity events.

Mirai was a malware strain that creates a botnet out of enslaved Internet of Things devices. By leveraging the resources of these IoT devices, Mirai took down networks and websites. 20 and 21-year-olds Josiah White and Paras Jha have pled guilty for developing and leveraging Mirai.

The duo were co-founders of Protraf Solutions LLC, a company that would mitigate DDoS attacks. Their business model was to sell their solutions to their DDoS victims, or use the DDoS attack the old-fashioned way: as a means of collecting ill-gotten monies from those desperate enough to pay them to stop the attack. Along with 21-year-old Dalton Norman, White and Jha also used Mirai to power a click fraud scheme that net them about 200 Bitcoin, Norman alone netting 30.

Mirai ultimately went on to power one of the biggest attacks the world has ever seen, using IoT devices to take down Dyn, causing many major websites to go down.

Ultimately, the three young malware developers were each charged with click fraud conspiracy, earning each a $250,000 fine and a stay of up to five years in prison. Jha and White plead guilty to conspiracy charges for writing and using Mirai and were each sentenced to an additional 5 years in prison and $250,000 fine, as well as three years of supervised release.

NSA Data
An employee of the National Security Agency, Nghia Hoang Pho, pled guilty on December 17, 2017, to a charge of “willful retention of national defense information.” According to the United States Justice Department, Pho was hired in 2006 as a developer for the Tailored Access Operations unit. The Tailored Access Operations unit, or TAO unit, creates specialized hacking tools that are used to collect data from the information systems used by overseas targets.

Between 2010 and March of 2015, Pho removed classified data and stored it on his home computer, which utilized antivirus software from Kaspersky Lab. Kaspersky Lab is suspected of having been exploited by Russian hackers to steal documents, perhaps including the ones Pho removed and saved at home.

The United States Department of Homeland Security has since issued a directive that bans the use of Kaspersky software in federal agencies. Pho could face up to 10 years in prison and is scheduled for sentencing on April 6.

One of four men who faced indictment in March of 2017 has pled guilty to hacking into Yahoo and exposing the usernames, passwords, and account information for essentially every Yahoo user, with the number of victims counting to about one billion.

22-year-old Karim Baratov, a Canadian, has been charged with working for two members of the Federal Security Service of the Russian Federation. In his work for the FSB, Baratov hacked into 80 accounts, as well as a total of over 11,000 webmail accounts since 2010. Baratov also provided hacking services that enabled access to accounts with Google, Yahoo, and Yandex, via the use of spear-phishing through custom content and a malicious link.

For his activities, Baratov has pled guilty to a total of nine counts. One count, for aggravated identity theft, has a mandatory sentence of two years, while each of the other eight counts could net him 10 years in jail and a fine of $250,000. However, the federal sentencing guidelines established in the United States could reduce the final sentence considerably.

While it is nice to see those responsible for cybercrime paying their dues, it is even better for certain cybercrimes to be prevented in the first place. Network Management Services can help your business with that. Call us at (707) 268-8850.

Credit Card and Identity Theft and What to Do If I...
Upgrading Your Technology? Be Careful of What You ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, August 19 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Malware Hackers Data Backup Backup VoIP Hosted Solutions Google Email Outsourced IT Data Recovery Innovation Mobile Devices Tech Term IT Support Microsoft Data Software Cloud Computing Communications Internet of Things BDR Saving Money Business Continuity Hardware Internet Efficiency Small Business Ransomware IT Services Business Cybercrime Cybersecurity Disaster Recovery Android User Tips Smartphones Managed IT Communication Network Server Computers Managed IT Services Gadgets Alert Browser Smartphone Artificial Intelligence Windows Avoiding Downtime How To Business Intelligence Passwords Business Management Data Security Data Protection Mobility Productivity Money Vulnerability Collaboration Chrome Phishing Router Miscellaneous Social Engineering Law Enforcement BYOD Social Media Mobile Device Management Save Money Two-factor Authentication Computer Proactive IT Flexibility IT Support Telephone Systems Windows 10 Redundancy Connectivity VPN Budget Compliance Managed Service Provider Firewall Document Management Office 365 Private Cloud Upgrade Word Facebook Identity Theft Spam Productivity Applications Bandwidth Blockchain Remote Monitoring Operating System Virtualization Spam Blocking Networking Bring Your Own Device App Infrastructure Solid State Drive Hacking Apps Holiday Information Data loss Password OneNote Business Owner Comparison File Sharing Microsoft Office Physical Security Information Technology IT Management Automation Big Data CES Government Workers Work/Life Balance Windows 7 Website Google Drive IT Plan Data Breach Content Management Paperless Office Update Access Control Content Filtering Smart Tech Quick Tips Public Cloud Unsupported Software Employer-Employee Relationship Windows 10 Data Storage Servers Office Tips Credit Cards Data storage Mobile Device Analysis Wi-Fi Value Flash Customer End of Support Human Resources Healthcare Google Docs Hard Drives iPhone Entertainment Wireless Charging Nanotechnology Monitor Augmented Reality History Workplace Tips USB eWaste Wire Meetings Travel Fraud Practices Tip of the week Telecommuting Storage Mobile IT Consultant Accountants Wireless Technology Safe Mode Windows 10s IBM MSP Internet exploMicrosoft Supercomputer PDF Black Market Staff Electronic Health Records Data Warehousing Voice over Internet Protocol HVAC Safety Unified Threat Management Fiber-Optic The Internet of Things Emergency Criminal Sports Marketing Hacker Data Management Amazon Hosted Computing Windows Server 2008 Remote Work SaaS Keyboard Password Manager Professional Services Office Leadership HBO Cortana Cables Devices Sync Advertising Digital Signature Machine Learning Multi-Factor Security Enterprise Content Management Cleaning Netflix Managed Service User Error Patch Management Hosted Solution Smart Office Screen Mirroring Software as a Service Training Amazon Web Services Inventory Business Mangement Addiction CrashOverride Tools Relocation IoT Outlook Specifications Business Technology Colocation Unified Communications Thought Leadership Audit Telephony Current Events Education Encryption YouTube Trending Password Management Hiring/Firing Health Computer Care Settings Legal Risk Management Scam Recovery Cast Online Shopping Regulations Gmail Cache Downtime Humor webinar Save Time Frequently Asked Questions Millennials Virtual Assistant Computing Infrastructure Theft Streaming Media Computer Fan Skype Knowledge Strategy Lifestyle NIST Files Samsung Reputation Internet Exlporer Students Apple Charger Emails HaaS Evernote Authentication Recycling Wireless Internet Root Cause Analysis Botnet Conferencing Insurance Excel Workforce Telephone System HIPAA Google Apps Content Filter FENG Start Menu Hybrid Cloud Electronic Medical Records Network Congestion Software Tips Mobile Computing Cryptocurrency Line of Business Benefits Lithium-ion battery Webinar Regulation Public Computer Search Worker Automobile Tech Support Worker Commute 5G Loyalty Smart Technology IT solutions Instant Messaging Troubleshooting Rootkit Video Games Twitter Employer Employee Relationship Customer Relationship Management Remote Worker Battery Competition How to IP Address Techology Remote Computing Experience Users Computer Accessories Customer Service Wiring Two Factor Authentication Proactive Mobile Office Vendor Management Content Assessment Scalability Music Fun Bluetooth Domains Politics Company Culture Wireless Best Practice Remote Monitoring and Maintenance Transportation Shadow IT WiFi Audiobook Books Television Wearable Technology Public Speaking Administration Virtual Reality Managing Stress Presentation