XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Perpetrators of Three Major Cyber Crimes Have Pled Guilty

Perpetrators of Three Major Cyber Crimes Have Pled Guilty

Every so often, it’s nice to hear about when the good guys win and cybercriminals get their comeuppance. Three such cybercriminals have entered guilty pleas to charges related to major cybersecurity events.

Mirai was a malware strain that creates a botnet out of enslaved Internet of Things devices. By leveraging the resources of these IoT devices, Mirai took down networks and websites. 20 and 21-year-olds Josiah White and Paras Jha have pled guilty for developing and leveraging Mirai.

The duo were co-founders of Protraf Solutions LLC, a company that would mitigate DDoS attacks. Their business model was to sell their solutions to their DDoS victims, or use the DDoS attack the old-fashioned way: as a means of collecting ill-gotten monies from those desperate enough to pay them to stop the attack. Along with 21-year-old Dalton Norman, White and Jha also used Mirai to power a click fraud scheme that net them about 200 Bitcoin, Norman alone netting 30.

Mirai ultimately went on to power one of the biggest attacks the world has ever seen, using IoT devices to take down Dyn, causing many major websites to go down.

Ultimately, the three young malware developers were each charged with click fraud conspiracy, earning each a $250,000 fine and a stay of up to five years in prison. Jha and White plead guilty to conspiracy charges for writing and using Mirai and were each sentenced to an additional 5 years in prison and $250,000 fine, as well as three years of supervised release.

NSA Data
An employee of the National Security Agency, Nghia Hoang Pho, pled guilty on December 17, 2017, to a charge of “willful retention of national defense information.” According to the United States Justice Department, Pho was hired in 2006 as a developer for the Tailored Access Operations unit. The Tailored Access Operations unit, or TAO unit, creates specialized hacking tools that are used to collect data from the information systems used by overseas targets.

Between 2010 and March of 2015, Pho removed classified data and stored it on his home computer, which utilized antivirus software from Kaspersky Lab. Kaspersky Lab is suspected of having been exploited by Russian hackers to steal documents, perhaps including the ones Pho removed and saved at home.

The United States Department of Homeland Security has since issued a directive that bans the use of Kaspersky software in federal agencies. Pho could face up to 10 years in prison and is scheduled for sentencing on April 6.

One of four men who faced indictment in March of 2017 has pled guilty to hacking into Yahoo and exposing the usernames, passwords, and account information for essentially every Yahoo user, with the number of victims counting to about one billion.

22-year-old Karim Baratov, a Canadian, has been charged with working for two members of the Federal Security Service of the Russian Federation. In his work for the FSB, Baratov hacked into 80 accounts, as well as a total of over 11,000 webmail accounts since 2010. Baratov also provided hacking services that enabled access to accounts with Google, Yahoo, and Yandex, via the use of spear-phishing through custom content and a malicious link.

For his activities, Baratov has pled guilty to a total of nine counts. One count, for aggravated identity theft, has a mandatory sentence of two years, while each of the other eight counts could net him 10 years in jail and a fine of $250,000. However, the federal sentencing guidelines established in the United States could reduce the final sentence considerably.

While it is nice to see those responsible for cybercrime paying their dues, it is even better for certain cybercrimes to be prevented in the first place. XFER can help your business with that. Call us at 734-927-6666 / 800-Get-XFER.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 24 February 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Microsoft Privacy Internet Cloud Saving Money Backup Software Best Practices Managed Service Provider Workplace Tips Small Business Business Computing Hackers Mobile Office Google Hardware Productivity Hosted Solutions Mobile Devices Data VoIP Gadgets Quick Tips Email IT Support Malware Efficiency Network Social Media Business Management Business Continuity Business Server Smartphones Innovation Virtualization Upgrade Miscellaneous IT Services Disaster Recovery Windows Communication Network Security Microsoft Office Users Computer Managed IT Services Mobile Device Management Communications Passwords Marketing Android User Tips Browser Holiday WiFi Save Money Smartphone Vendor Management Alert Windows 10 Operating System Mobile Computing Remote Monitoring Avoiding Downtime Data Backup Bring Your Own Device Apple Information Technology Current Events IT Solutions Best Practice The Internet of Things Going Green Telephone Systems BYOD Remote Computing History Computers Ransomware Chrome Cybercrime Outsourced IT Employer-Employee Relationship Big Data Trending Phone System Hacking IT Consultant Spam Health Application Firewall Social Engineering Wireless Technology Router Office Budget Lithium-ion Battery App Collaboration BDR Automation Proactive IT Cloud Computing Data Recovery VPN Excel Printer How To Fax Server Maintenance iPhone Recovery Content Filtering Managed IT Services Bandwidth Facebook Money Two-factor Authentication Windows 8 Internet of Things Mobility Business Managament Cybersecurity Gmail Business Intelligence Virus Analytics Mouse Hard Drives Private Cloud Outlook Networking Antivirus Unified Threat Management PowerPoint Artificial Intelligence Value User Error Customer Relationship Management Humor Tutorials Flexibility Apps Phishing Downtime Inbound Marketing Google Drive Network Congestion Managed IT Search Digital Payment Computer Repair Office 365 Redundancy Law Enforcement Saving Time Retail Tech Support Windows 10 Conferencing Memory Administration Save Time Tablet Office Tips Website Data Security Social Networking Data Management Compliance Risk Management Credit Cards Statistics Webinar Piracy Intranet Skype Leadership Settings CES Computer Accessories Spam Blocking Physical Security Human Resources Wireless Public Cloud Biometrics IT service Hacker Bluetooth Data Protection Best Available Sports Word Touchscreen Vulnerability eWaste Robot Online Currency Comparison Twitter Samsung Data Storage PDF Wi-Fi Meetings Safety Point of Sale Government Workers DDoS Solid State Drive Entertainment Productivity IT Management Black Market Programming Wearable Technology Environment Running Cable IT Plan SaaS Training IBM Unsupported Software Social Scam Data storage Administrator OneNote Internet Exlporer People Work/Life Balance HaaS Document Management Recycling Mobile Device End of Support Data Breach Identity Theft Streaming Media Video Surveillance Supercomputer NarrowBand Criminal HBO Mobile Customers Law Firm IT Encryption Multi-Factor Security Augmented Reality Wireless Charging Patch Management Data loss Advertising Instant Messaging Knowledge Chromecast Fraud Help Desk Frequently Asked Questions Professional Services 3D Notifications Windows 8.1 Update Lifestyle LinkedIn Fiber-Optic Screen Mirroring Laptop WIndows 7 Webcam Amazon Content Management Tip of the week Tools HIPAA Windows 10s SharePoint Worker Commute Cables Cast Hybrid Cloud Charger IT Support Domains Touchpad Managing Stress Amazon Web Services Debate Blockchain Windows Server 2008 Co-managed IT Keyboard Relocation Science Unified Communications Computer Care Online Shopping Staff Windows 7 IT Security Botnet Audit Tablets Virtual Desktop Windows Media Player Specifications Theft Data Warehousing Regulations Gaming Console Evernote nternet Education Digital Signature Upgrades Travel Computer Fan Analyitcs Customer Service Uninterrupted Power Supply Company Culture Millennials Crowdfunding Cortana Servers Consultant Distributed Denial of Service 360 FENG PC Care Files Password Cleaning Net Neutrality Cameras Workforce Google Apps Electronic Medical Records Flash eBay Business Owner Emails File Sharing Licensing Display Software as a Service Alerts Colocation Virtual Reality Shortcut Shadow IT Printer Server Telecommuting Infrastructure Hiring/Firing Sync Text Messaging User IaaS Macro Update Work Station Hosted Solution Computing Infrastructure Bloatware Legal Scheduling Remote Work Password Manager Software Tips Telephony Monitor USB Google Docs Entrepreneur YouTube Business Mangement Start Menu Netflix Reputation Print Server Hiring/Firing Voice over Internet Protocol Remote Support Root Cause Analysis Internet exploMicrosoft Cost Management Video Games Audiobook Worker Scalability Politics Transportation Rootkit How to Benefits Smart Technology Experience Two Factor Authentication Loyalty Battery Music Applications Thank You Assessment Troubleshooting Techology Congratulations Television Automobile Webinar Public Computer IT solutions Books CrashOverride Employer Employee Relationship Content Emergency

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *