Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Network Solutions Unlimited has been serving the Decatur area since 2013, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Three Cybercrimes Have Ended in Guilty Pleas

Three Cybercrimes Have Ended in Guilty Pleas

When so much of what we write is about the threats and attacks that exist (and are carried out) in cyberspace, it is particularly refreshing when we can discuss those responsible for these attacks in the context of their legal proceedings. For example, today we are able to discuss how actors in some of the biggest recent cybersecurity events have entered guilty pleas.

Mirai
As a malware strain that leveraged Internet of Things devices to create a zombified botnet and launch Distributed Denial of Service attacks, Mirai was responsible for no small amount of trouble on the Internet. Its developers, 20-year-old Josiah White and 21-year-old Paras Jha, have pled guilty to developing and leveraging Mirai to their own ends.

The two established a company called Protraf Solutions LLC, which was dedicated to mitigating DDoS attacks. Using this company in tandem with their creation, White and Jha would launch a DDoS attack against a company and then sell their solutions to that company, or would collect money through the other side, accepting payment from their victims to stop the attack. White and Jha also teamed up with an accomplice, 21-year-old Dalton Norman, to leverage Mirai as the driving force behind a click fraud scheme. This scheme alone brought them around 200 Bitcoin, with 30 going to Norman.

Mirai was also responsible for powering the DDoS attack on Dyn, one of the largest data centers east of the Mississippi River.

The trio was charged with click fraud conspiracy, each being sentenced to a five year stay in prison and a fine of $250,000. Jha and White were also charged with conspiracy for writing and using Mirai, to which they pled guilty. This added another five years to their time in prison, another $250,000 fine, along with three years of supervised release.

NSA Data
On December 17, 2017, an employee of the National Security Agency pled guilty to “willful retention of national defense information.” According to the United States Justice Department, Nghia Hoang Pho was hired as a developer for the Tailored Access Operations, or TAO, unit in 2006. The TAO unit was tasked with creating hacking tools to be used to collect data from overseas targets and their information systems.

In the time between 2010 and March of 2015, Pho took classified data and stored it on his home system. This system had antivirus software from Kaspersky Lab installed on it. There are suspicions that Russian hackers have exploited Kaspersky Lab in order to steal documents, quite possibly the ones taken home by Pho. The US Department of Homeland Security issued a directive that disallows the use of software made by Kaspersky Lab in federal agencies.

Pho faces up to 10 years in prison, and will stand for sentencing on April 6.

Yahoo
In March of 2017, four men faced indictment for hacking into Yahoo, effectively exposing the personal account information of one billion users. 22-year-old Karim Baratov has been charged with cooperating with two members of the FSB, or the Federal Security Service of the Russian Federation.

As part of his work for the FSB, the young Canadian hacked into 80 accounts, in addition to the more than 11,000 webmail accounts he had hacked since 2010. Utilizing customized spear-phishing content, Baratov also provided a service that granted access to Google, Yahoo, and Yantex accounts.

Baratov has entered a guilty plea for all nine counts he faces. The first count is for aggravated identity theft, and carries a mandatory sentence of two years. The other eight counts are for violating the Computer Fraud and Abuse Act, and could each carry a sentence of 10 years and a fine of $250,000. Fortunately for Baratov, the United States’ federal sentencing guidelines could shorten the amount of time spent in jail by no small measure.

While seeing those who committed cybercrimes face the music is satisfying, it is even better to know that you’re protected from becoming a victim of some similar plot. Network Solutions Unlimited can help by providing the security solutions and training to help keep your business safe. Give us a call at 217-428-6449 to get started.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 21 February 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

HBO IT Services Computer Automation Going Green Two-factor Authentication NFL IT Support Computer Accessories Identity Theft Windows 10 Best Practices Facebook Internet Best Practice Business Owner Hybrid Cloud Software Monitors Security Samsung Work/Life Balance Collaboration Windows Workplace Tips Books Network Security Virtual Reality Smartphone Training Google Maps VPN Entertainment Outsourced IT Two Factor Authentication hacker Robot Data storage How to Cybercrime Content Root Cause Analysis Solid State Drive iPhone Risk Management Outlook Networking Downtime Travel BYOD Laptop Windows 10 Passwords IT budget File Sharing Data Storage Users Spam Network Remote Monitoring OneNote Data Backup Data Recovery Value Shortcut How To Thank You Files Law Enforcement Gadgets Social Engineering Wireless Technology Settings Private Cloud Disaster Recovery Smartphones Hosted Solution Emergency Saving Money Meetings Vulnerability Scalability SaaS Consultant Big Data Spyware Legal Sync Data Management Black Market WiFi Audiobook Computing Infrastructure Education Software as a Service Webinar Operating System Cast Regulation Tech Support Office 365 Google Money Gmail The Internet of Things Evernote Productivity Data Office Tips Internet exploMicrosoft Upgrade Small Business Quick Tips Productivity IT solutions Blockchain Touchscreen History Search Video Games Sports End of Support Browser Email Colocation Computer Care intranet Redundancy Artificial Intelligence Emails Gifts Sales Legislation Bluetooth Retail User Error Conferencing Hardware Firewall Keyboard Public Computer Miscellaneous Privacy Customer Nanotechnology App Content Filtering Monitor HIPAA Managed IT Service Technology Augmented Reality Managed IT Cloud Congratulations Mobility Chrome Mobile Devices Automobile WannaCry Telephone Systems Recovery Relocation Save Time Applications Vendor Management Storage Assessment Malware Reputation Instant Messaging Business Computing Bandwidth Information Technology Maintenance Hard Drives Hiring/Firing Office Internet Exlporer Business Intelligence Excel Hard Disk Drive CrashOverride Safety Microsoft Word Rootkit Computer Fan Upgrades Updates Apple Internet of Things Password Touchpad Innovation eWaste Ransomware Patch Management Tip of the Week Ciminal Wireless Charging Charger FAQ Phishing Cost Management Computers Data Loss Business Management IT Support MSP Router Budget User Tips Flexibility Business Continuity Television Politics iOS Project Management Cleaning Compliance WIndows Server 2008 Cloud Computing Battery Experience Shadow IT Public Cloud Windows Ink Lifestyle Fraud Application Wireless Avoiding Downtime Google Docs Hackers BDR Benefits Remote Computing Marketing Credit Cards Employer Employee Relationship Cache Unified Threat Management Devices Chromecast Managed IT Services Save Money Cortana Licensing Professional Services Android Windows 10s Business Worker Commute Personal Information Physical Security Backup Bring Your Own Device Communications IT Management Advertising Phone System Virtualization Worker Holiday Employer-Employee Relationship Word Proactive IT Microsoft Microsoft Excel Troubleshooting Unsupported Software HaaS Microsoft Office USB Techology Commerce Electronic Medical Records Dark Web Mobile Scam Mobile Device Tablets Alert Google Drive Spam Blocking Screen Mirroring Data Security Hosted Solutions Smart Technology Apps Audit PDF Data Protection Specifications Document Management Edge Managed Service Provider Social Media Transportation Device Security Efficiency Hacking Health Comparison VoIP Government Data Breach Loyalty Managed IT Services Encryption Wi-Fi Adobe Server Administration Cybersecurity IT Solutions Humor Identities Workers Mobile Device Management

Sign Up for Our Newsletter

  • Company Name *
  • First Name *
  • Last Name *