Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Three Cybercrimes Have Ended in Guilty Pleas

Three Cybercrimes Have Ended in Guilty Pleas

When so much of what we write is about the threats and attacks that exist (and are carried out) in cyberspace, it is particularly refreshing when we can discuss those responsible for these attacks in the context of their legal proceedings. For example, today we are able to discuss how actors in some of the biggest recent cybersecurity events have entered guilty pleas.

Mirai
As a malware strain that leveraged Internet of Things devices to create a zombified botnet and launch Distributed Denial of Service attacks, Mirai was responsible for no small amount of trouble on the Internet. Its developers, 20-year-old Josiah White and 21-year-old Paras Jha, have pled guilty to developing and leveraging Mirai to their own ends.

The two established a company called Protraf Solutions LLC, which was dedicated to mitigating DDoS attacks. Using this company in tandem with their creation, White and Jha would launch a DDoS attack against a company and then sell their solutions to that company, or would collect money through the other side, accepting payment from their victims to stop the attack. White and Jha also teamed up with an accomplice, 21-year-old Dalton Norman, to leverage Mirai as the driving force behind a click fraud scheme. This scheme alone brought them around 200 Bitcoin, with 30 going to Norman.

Mirai was also responsible for powering the DDoS attack on Dyn, one of the largest data centers east of the Mississippi River.

The trio was charged with click fraud conspiracy, each being sentenced to a five year stay in prison and a fine of $250,000. Jha and White were also charged with conspiracy for writing and using Mirai, to which they pled guilty. This added another five years to their time in prison, another $250,000 fine, along with three years of supervised release.

NSA Data
On December 17, 2017, an employee of the National Security Agency pled guilty to “willful retention of national defense information.” According to the United States Justice Department, Nghia Hoang Pho was hired as a developer for the Tailored Access Operations, or TAO, unit in 2006. The TAO unit was tasked with creating hacking tools to be used to collect data from overseas targets and their information systems.

In the time between 2010 and March of 2015, Pho took classified data and stored it on his home system. This system had antivirus software from Kaspersky Lab installed on it. There are suspicions that Russian hackers have exploited Kaspersky Lab in order to steal documents, quite possibly the ones taken home by Pho. The US Department of Homeland Security issued a directive that disallows the use of software made by Kaspersky Lab in federal agencies.

Pho faces up to 10 years in prison, and will stand for sentencing on April 6.

Yahoo
In March of 2017, four men faced indictment for hacking into Yahoo, effectively exposing the personal account information of one billion users. 22-year-old Karim Baratov has been charged with cooperating with two members of the FSB, or the Federal Security Service of the Russian Federation.

As part of his work for the FSB, the young Canadian hacked into 80 accounts, in addition to the more than 11,000 webmail accounts he had hacked since 2010. Utilizing customized spear-phishing content, Baratov also provided a service that granted access to Google, Yahoo, and Yantex accounts.

Baratov has entered a guilty plea for all nine counts he faces. The first count is for aggravated identity theft, and carries a mandatory sentence of two years. The other eight counts are for violating the Computer Fraud and Abuse Act, and could each carry a sentence of 10 years and a fine of $250,000. Fortunately for Baratov, the United States’ federal sentencing guidelines could shorten the amount of time spent in jail by no small measure.

While seeing those who committed cybercrimes face the music is satisfying, it is even better to know that you’re protected from becoming a victim of some similar plot. Network Solutions Unlimited can help by providing the security solutions and training to help keep your business safe. Give us a call at 217-428-6449 to get started.

4 Skills Needed for IT Project Management Success
Tip of the Week: Learn How to Use the Microsoft Ed...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, August 22 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Office Tips Risk Management Unsupported Software Audiobook Hard Drive Troubleshooting Chrome Networking Analysis Managed IT Cache Technology App HaaS Audit Unified Threat Management Monitoring Television Travel Virus Employer-Employee Relationship Proactive Mobile Security Big Data Keyboard Wireless Technology Privacy Maintenance Smartphone Sports Regulation Wireless IT Solutions Automobile Advertising Redundancy VPN Data Recovery Devices Samsung HBO Avoiding Downtime USB Hybrid Cloud Blockchain Relocation Adobe Identities Root Cause Analysis Collaboration Battery Loyalty Chromebook Content Google Assistant Lifestyle User Tips Bandwidth Dark Web Scam Tip of the Week Antivirus The Internet of Things Politics Security Ransomware Techology Computer Fan Printing Unified Communications Smart Tech Black Market Alexa for Business Apps Save Time Health Data Loss Business Continuity Information Technology Licensing Physical Security Holiday OneNote Computing Artificial Intelligence Data Privacy Virtualization Hard Disk Drive Electronic Medical Records Rootkit IoT Instant Messaging Automation Administration Webinar Microsoft Office Workers Monitors Word Training Students Internet of Things Content Filtering iOS Software IT solutions Workplace Tips Tablets Company Culture Streaming Media NFL Upgrade Best Practices Vendor Management Malware Benefits Cast PDF Virtual Reality Password Business Computing Video Games Upgrades MSP Remote Computing Bluetooth Worker Touchscreen Memory Thank You Miscellaneous Spam Blocking Financial Technology Tech Term Credit Cards Email Social Engineering Hiring/Firing Twitter Managed IT Services Data Security Amazon User Error Public Cloud Disaster Recovery Conferencing Hackers Business Technology Windows 10 Remote Monitoring Gmail Smart Technology Telephone Systems Customer Robot Innovation Communication Operating System Best Practice Spyware Software as a Service Microsoft Word Budget Google IT Support Fraud eWaste Managed IT Service Ciminal Tech Support Save Money Retail Storage Laptop Data Evernote Data storage Windows Patch Management Virtual Assistant Hardware Cloud Internet exploMicrosoft File Storage Gamification Data Protection Consultant Microsoft Charger Emergency Private Cloud Gadgets Update Spam Two Factor Authentication IT Services Reputation Outsourced IT Document Management Computer Care Google Drive Windows 10 Windows Ink Augmented Reality Computer Accessories Internet Computer Smartphones Internet Exlporer Settings Going Green Meetings Business Management Wasting Money BYOD Computing Infrastructure Shadow IT Monitor Personal Information Managing Stress Cloud Computing Humor iPhone Phone System Flexibility Mobility Edge Emails WIndows Server 2008 Identity Employer Employee Relationship How To Money Compliance Law Enforcement Phishing Network Security Colocation Quick Tips Windows 10s Proactive IT Device Security Mobile Devices IT Support Two-factor Authentication Office 365 Search CrashOverride Gifts File Sharing Financial Network Marketing Shortcut Business Owner Efficiency Managed Service Provider Experience Commerce How to Apple Recovery Education Work/Life Balance WiFi Router End of Support Chromecast Hosted Solution SaaS Office Social Media Data Storage hacker Cybercrime Legal Information BDR PowerPoint Worker Commute Management Google Docs FAQ Data Backup Cleaning WannaCry History Government Alert Server Communications Excel Project Management Bring Your Own Device Books Congratulations Cybersecurity Transportation Updates Saving Money Business Intelligence Users VoIP Solid State Drive Firewall Legislation Safety Wireless Internet HIPAA Business Mobile Device Management Cortana Application App store Value Identity Theft Mobile Device Websites Wi-Fi Backup Facebook Assessment Computers Specifications Applications Encryption Entertainment Public Computer Data Theft Android Scalability Hacking Data Management intranet WPA3 Content Filter IT Management Browser IT budget Language Screen Mirroring Passwords Connectivity Sync Downtime Productivity Outlook Small Business Vulnerability Touchpad Nanotechnology Hard Drives Comparison Files Productivity Cost Management Hosted Solutions Wireless Charging Mobile Data Breach Microsoft Excel Google Maps Professional Services Sales Computer Forensics Managed IT Services