Contact us today!

Network Solutions Unlimited Blog

Three Cybercrimes Have Ended in Guilty Pleas

Three Cybercrimes Have Ended in Guilty Pleas

When so much of what we write is about the threats and attacks that exist (and are carried out) in cyberspace, it is particularly refreshing when we can discuss those responsible for these attacks in the context of their legal proceedings. For example, today we are able to discuss how actors in some of the biggest recent cybersecurity events have entered guilty pleas.

As a malware strain that leveraged Internet of Things devices to create a zombified botnet and launch Distributed Denial of Service attacks, Mirai was responsible for no small amount of trouble on the Internet. Its developers, 20-year-old Josiah White and 21-year-old Paras Jha, have pled guilty to developing and leveraging Mirai to their own ends.

The two established a company called Protraf Solutions LLC, which was dedicated to mitigating DDoS attacks. Using this company in tandem with their creation, White and Jha would launch a DDoS attack against a company and then sell their solutions to that company, or would collect money through the other side, accepting payment from their victims to stop the attack. White and Jha also teamed up with an accomplice, 21-year-old Dalton Norman, to leverage Mirai as the driving force behind a click fraud scheme. This scheme alone brought them around 200 Bitcoin, with 30 going to Norman.

Mirai was also responsible for powering the DDoS attack on Dyn, one of the largest data centers east of the Mississippi River.

The trio was charged with click fraud conspiracy, each being sentenced to a five year stay in prison and a fine of $250,000. Jha and White were also charged with conspiracy for writing and using Mirai, to which they pled guilty. This added another five years to their time in prison, another $250,000 fine, along with three years of supervised release.

NSA Data
On December 17, 2017, an employee of the National Security Agency pled guilty to “willful retention of national defense information.” According to the United States Justice Department, Nghia Hoang Pho was hired as a developer for the Tailored Access Operations, or TAO, unit in 2006. The TAO unit was tasked with creating hacking tools to be used to collect data from overseas targets and their information systems.

In the time between 2010 and March of 2015, Pho took classified data and stored it on his home system. This system had antivirus software from Kaspersky Lab installed on it. There are suspicions that Russian hackers have exploited Kaspersky Lab in order to steal documents, quite possibly the ones taken home by Pho. The US Department of Homeland Security issued a directive that disallows the use of software made by Kaspersky Lab in federal agencies.

Pho faces up to 10 years in prison, and will stand for sentencing on April 6.

In March of 2017, four men faced indictment for hacking into Yahoo, effectively exposing the personal account information of one billion users. 22-year-old Karim Baratov has been charged with cooperating with two members of the FSB, or the Federal Security Service of the Russian Federation.

As part of his work for the FSB, the young Canadian hacked into 80 accounts, in addition to the more than 11,000 webmail accounts he had hacked since 2010. Utilizing customized spear-phishing content, Baratov also provided a service that granted access to Google, Yahoo, and Yantex accounts.

Baratov has entered a guilty plea for all nine counts he faces. The first count is for aggravated identity theft, and carries a mandatory sentence of two years. The other eight counts are for violating the Computer Fraud and Abuse Act, and could each carry a sentence of 10 years and a fine of $250,000. Fortunately for Baratov, the United States’ federal sentencing guidelines could shorten the amount of time spent in jail by no small measure.

While seeing those who committed cybercrimes face the music is satisfying, it is even better to know that you’re protected from becoming a victim of some similar plot. Network Solutions Unlimited can help by providing the security solutions and training to help keep your business safe. Give us a call at 217-428-6449 to get started.

4 Skills Needed for IT Project Management Success
Tip of the Week: Learn How to Use the Microsoft Ed...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 24 May 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Business Owner Adobe Government OneNote Office Password Internet Software as a Service Device Security Two-factor Authentication Computer Accessories Information Technology Windows 10 IT Support Cost Management Hosted Solution Computing Big Data Hard Drive Phone System Remote Computing Wireless Technology Data Protection Browser FAQ Passwords Television Spam Blocking Remote Monitoring Audit Analysis User Tips Edge Techology Websites Monitoring Data Security Content Hackers Commerce Administration Private Cloud How To Monitor Social Engineering Meetings Physical Security Legal Users Business Intelligence Devices Cortana History Smart Tech Books Outsourced IT Assessment Proactive IT Comparison Holiday PDF Virtual Reality VoIP Google Drive Bring Your Own Device Charger Microsoft Excel Data storage Apps Privacy Bluetooth Update IT Solutions Cloud Computing Monitors Android Tech Support Hosted Solutions iOS Root Cause Analysis Connectivity iPhone Scalability CrashOverride Touchpad Compliance Malware Specifications Redundancy Virus App Shadow IT Budget Mobile Security Outlook Avoiding Downtime Office Tips Laptop intranet Video Games Management Word Dark Web Search Windows Email Collaboration hacker Operating System Document Management Files Retail Computer Fan Gmail App store Upgrade Data Backup Tablets Windows Ink Training Lifestyle Automation Content Filter Settings Cache Wireless Instant Messaging Application Business Management Shortcut Electronic Medical Records Communications Unified Threat Management MSP Artificial Intelligence Emergency Computer Office 365 Windows 10s Cast Communication Apple Internet of Things Project Management Network Entertainment Transportation IT budget Wireless Charging Software Education The Internet of Things Solid State Drive Tip of the Week Screen Mirroring Unsupported Software Internet exploMicrosoft Emails Server Augmented Reality Professional Services Hard Drives Fraud Recovery Hacking Legislation VPN Quick Tips Save Time Data Theft Google Assistant Smartphone Miscellaneous Loyalty Workers Twitter Updates Nanotechnology WannaCry Applications IT Services BYOD Risk Management Spam WiFi Router Microsoft Office Worker Commute Chrome Vulnerability Value Identities Google Maps Printing Data Safety eWaste Going Green Streaming Media Security Facebook Business Computing Microsoft Tech Term Personal Information Mobile Devices Cybersecurity Technology Sync File Sharing Computer Forensics Networking Law Enforcement Reputation Saving Money Black Market Backup Hybrid Cloud Workplace Tips Excel Sales Hardware SaaS Consultant Ransomware Employer-Employee Relationship Keyboard Storage Innovation Best Practices Upgrades Managed Service Provider Gadgets Benefits Employer Employee Relationship Politics Alert Google Docs Chromebook HIPAA Wi-Fi Conferencing Sports BDR Small Business Productivity Money Automobile Maintenance Data Breach Computer Care Humor Disaster Recovery Regulation Data Privacy Language Vendor Management Social Media Hiring/Firing Relocation Advertising Public Cloud Managed IT Service Save Money Mobility Encryption Patch Management USB Google Colocation Battery Efficiency Computers Public Computer IT solutions Data Loss Data Recovery Two Factor Authentication Downtime Audiobook User Error Computing Infrastructure IT Support Customer Proactive Congratulations Licensing Scam Internet Exlporer Phishing Bandwidth Gifts Worker Spyware Evernote Troubleshooting Marketing Mobile IT Management Cleaning How to Productivity Business Robot Touchscreen Financial Technology Travel Best Practice Microsoft Word IoT Chromecast End of Support WIndows Server 2008 Webinar Thank You HBO Mobile Device Identity Antivirus Mobile Device Management Smartphones Hard Disk Drive Cloud Business Continuity Managed IT Services Firewall Data Storage NFL Identity Theft Managed IT Services HaaS Credit Cards Smart Technology Windows 10 Content Filtering Blockchain Cybercrime Samsung Ciminal Managed IT Data Management Network Security Work/Life Balance Virtualization Rootkit Telephone Systems Flexibility Experience Health