Contact us today!

Network Solutions Unlimited Blog

Three Cybercrimes Have Ended in Guilty Pleas

Three Cybercrimes Have Ended in Guilty Pleas

When so much of what we write is about the threats and attacks that exist (and are carried out) in cyberspace, it is particularly refreshing when we can discuss those responsible for these attacks in the context of their legal proceedings. For example, today we are able to discuss how actors in some of the biggest recent cybersecurity events have entered guilty pleas.

As a malware strain that leveraged Internet of Things devices to create a zombified botnet and launch Distributed Denial of Service attacks, Mirai was responsible for no small amount of trouble on the Internet. Its developers, 20-year-old Josiah White and 21-year-old Paras Jha, have pled guilty to developing and leveraging Mirai to their own ends.

The two established a company called Protraf Solutions LLC, which was dedicated to mitigating DDoS attacks. Using this company in tandem with their creation, White and Jha would launch a DDoS attack against a company and then sell their solutions to that company, or would collect money through the other side, accepting payment from their victims to stop the attack. White and Jha also teamed up with an accomplice, 21-year-old Dalton Norman, to leverage Mirai as the driving force behind a click fraud scheme. This scheme alone brought them around 200 Bitcoin, with 30 going to Norman.

Mirai was also responsible for powering the DDoS attack on Dyn, one of the largest data centers east of the Mississippi River.

The trio was charged with click fraud conspiracy, each being sentenced to a five year stay in prison and a fine of $250,000. Jha and White were also charged with conspiracy for writing and using Mirai, to which they pled guilty. This added another five years to their time in prison, another $250,000 fine, along with three years of supervised release.

NSA Data
On December 17, 2017, an employee of the National Security Agency pled guilty to “willful retention of national defense information.” According to the United States Justice Department, Nghia Hoang Pho was hired as a developer for the Tailored Access Operations, or TAO, unit in 2006. The TAO unit was tasked with creating hacking tools to be used to collect data from overseas targets and their information systems.

In the time between 2010 and March of 2015, Pho took classified data and stored it on his home system. This system had antivirus software from Kaspersky Lab installed on it. There are suspicions that Russian hackers have exploited Kaspersky Lab in order to steal documents, quite possibly the ones taken home by Pho. The US Department of Homeland Security issued a directive that disallows the use of software made by Kaspersky Lab in federal agencies.

Pho faces up to 10 years in prison, and will stand for sentencing on April 6.

In March of 2017, four men faced indictment for hacking into Yahoo, effectively exposing the personal account information of one billion users. 22-year-old Karim Baratov has been charged with cooperating with two members of the FSB, or the Federal Security Service of the Russian Federation.

As part of his work for the FSB, the young Canadian hacked into 80 accounts, in addition to the more than 11,000 webmail accounts he had hacked since 2010. Utilizing customized spear-phishing content, Baratov also provided a service that granted access to Google, Yahoo, and Yantex accounts.

Baratov has entered a guilty plea for all nine counts he faces. The first count is for aggravated identity theft, and carries a mandatory sentence of two years. The other eight counts are for violating the Computer Fraud and Abuse Act, and could each carry a sentence of 10 years and a fine of $250,000. Fortunately for Baratov, the United States’ federal sentencing guidelines could shorten the amount of time spent in jail by no small measure.

While seeing those who committed cybercrimes face the music is satisfying, it is even better to know that you’re protected from becoming a victim of some similar plot. Network Solutions Unlimited can help by providing the security solutions and training to help keep your business safe. Give us a call at 217-428-6449 to get started.

4 Skills Needed for IT Project Management Success
Tip of the Week: Learn How to Use the Microsoft Ed...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, November 18 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tech Term Managing Stress Shadow IT Software Office 365 Cloud Technology Business Credit Cards Hard Drive Save Money Social Engineering Best Practice Data Recovery Office Tips Admin Adobe USB MSP Phone System Cost Management Alert Gadgets Spam Peripheral Redundancy Mobile Security Browser Data Backup CrashOverride Hiring/Firing Chromecast Data Breach Risk Management Productivity Smartphone Rootkit Windows 7 File Sharing Chrome Network Security Data Storage App Content Filter Managed IT Monitoring Efficiency Wireless Technology Windows Workers WannaCry Android Security Email Phishing Television Loyalty Retail Saving Time Office PowerPoint Work/Life Balance hacker Training Data Management Tech Support Internet Exlporer Server Troubleshooting Bluetooth Microsoft Office VPN Smartphones Politics Worker Colocation Going Green Sports IoT Keyboard Business Technology Health Meetings Black Market Marketing WIndows Server 2008 Consultant Users Managed Service Wi-Fi iPhone WiFi Unified Communications Physical Security Search Employee-Employer Relationship Gifts Backup Printers Mobility Data Privacy Hard Disk Drive Operating System Safety Touchscreen How to IT Solutions Upgrades Chromebook Regulation Testing SaaS Business Management Internet Word Remote Computing End of Support Blockchain Application Updates Vendor Management Patch Management Wireless Charging Hacking Content Analysis Data Loss Password Specifications Edge Language Students Benefits Vendor Streaming Media Wireless Internet Ransomware Battery Administration Microsoft IT Support Hackers Unified Threat Management Mobile Devices Downtime Laptop Comparison Thank You Advertising Financial Technology Cast Professional Services Memory Hard Drives Avoiding Downtime Computer Accessories Social Media Collaboration Telephone Device Security Value Keyboard Shortcuts Employer Employee Relationship Compliance Government Display Automation Wireless Access Control Mobile Device Two-factor Authentication Monitor Files Data Applications Cybercrime Google Assistant Antivirus Shortcut Windows 10 WPA3 Microsoft Word Document Management Mobile Hosted Solutions Identities Project Management Internet exploMicrosoft Travel BDR NFL Management Smart Technology The Internet of Things Budget Identity Theft Proactive Cache Alexa for Business Touchpad Transportation IT Services Reputation Windows 10 Augmented Reality Outsourced IT Licensing Managed IT Service Content Filtering Monitors Education Connectivity Wasting Money PDF Virtual Assistant Spyware App store Business Owner Utility Computing IT solutions Internet of Things Managed IT Services Money Camera Experience Firewall Networking Productivity Law Enforcement Managed IT Services Disaster Recovery Flexibility Emails Customer Wasting Time Computer Care Innovation Best Practices Books Devices Vulnerability Big Data Commerce Private Cloud HBO Tip of the Week Co-Managed Services iOS Solid State Drive Saving Money Video Games Network Encryption Hybrid Cloud Small Business Mobile Device Management Update Financial Virtual Reality Humor Public Computer Smart Tech Telephone Systems Communications Holiday Robot Spam Blocking Sales Scam Automobile Cybersecurity Scalability Computing Audit User Tips Bring Your Own Device Business Continuity File Storage Managed Service Provider Identity Electronic Medical Records Windows 10s Computer Fan Cortana HaaS BYOD Amazon Excel Google Apps Dark Web Nanotechnology Virus Webinar User Error Software as a Service Worker Commute HIPAA Save Time Business Intelligence Computer Printing Google Docs Bandwidth Artificial Intelligence Communication Hardware Router Computer Forensics Computers Emergency Assessment Congratulations Techology Ciminal Relocation Google Drive Apple Root Cause Analysis Miscellaneous Remote Monitoring Malware Windows Ink Audiobook Information Technology Recovery Data storage Tablets Hyperlink Samsung Privacy Sync Evernote Charger OneNote Two Factor Authentication Screen Mirroring Public Cloud Data Theft Outlook IT budget Information Conferencing Proactive IT Settings IT Support Computing Infrastructure Cleaning Business Computing Maintenance intranet FAQ Twitter Quick Tips Google Maps IT Management How To Websites Storage Upgrade Accessory VoIP Virtualization eWaste Hosted Solution Gamification Data Protection Lifestyle Unsupported Software Facebook Personal Information Employer-Employee Relationship Entertainment History Gmail Fraud Passwords Company Culture Workplace Tips Microsoft Excel Cloud Computing Legal Instant Messaging Legislation Projects Data Security