Contact Us! 469-272-0777

LiveZilla Live Help
 

AspireTech Blog

AspireTech has been serving the Mansfield area since 1999 , providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Perpetrators of Three Major Cyber Crimes Have Pled Guilty

Perpetrators of Three Major Cyber Crimes Have Pled Guilty

Every so often, it’s nice to hear about when the good guys win and cybercriminals get their comeuppance. Three such cybercriminals have entered guilty pleas to charges related to major cybersecurity events.

Mirai
Mirai was a malware strain that creates a botnet out of enslaved Internet of Things devices. By leveraging the resources of these IoT devices, Mirai took down networks and websites. 20 and 21-year-olds Josiah White and Paras Jha have pled guilty for developing and leveraging Mirai.

The duo were co-founders of Protraf Solutions LLC, a company that would mitigate DDoS attacks. Their business model was to sell their solutions to their DDoS victims, or use the DDoS attack the old-fashioned way: as a means of collecting ill-gotten monies from those desperate enough to pay them to stop the attack. Along with 21-year-old Dalton Norman, White and Jha also used Mirai to power a click fraud scheme that net them about 200 Bitcoin, Norman alone netting 30.

Mirai ultimately went on to power one of the biggest attacks the world has ever seen, using IoT devices to take down Dyn, causing many major websites to go down.

Ultimately, the three young malware developers were each charged with click fraud conspiracy, earning each a $250,000 fine and a stay of up to five years in prison. Jha and White plead guilty to conspiracy charges for writing and using Mirai and were each sentenced to an additional 5 years in prison and $250,000 fine, as well as three years of supervised release.

NSA Data
An employee of the National Security Agency, Nghia Hoang Pho, pled guilty on December 17, 2017, to a charge of “willful retention of national defense information.” According to the United States Justice Department, Pho was hired in 2006 as a developer for the Tailored Access Operations unit. The Tailored Access Operations unit, or TAO unit, creates specialized hacking tools that are used to collect data from the information systems used by overseas targets.

Between 2010 and March of 2015, Pho removed classified data and stored it on his home computer, which utilized antivirus software from Kaspersky Lab. Kaspersky Lab is suspected of having been exploited by Russian hackers to steal documents, perhaps including the ones Pho removed and saved at home.

The United States Department of Homeland Security has since issued a directive that bans the use of Kaspersky software in federal agencies. Pho could face up to 10 years in prison and is scheduled for sentencing on April 6.

Yahoo
One of four men who faced indictment in March of 2017 has pled guilty to hacking into Yahoo and exposing the usernames, passwords, and account information for essentially every Yahoo user, with the number of victims counting to about one billion.

22-year-old Karim Baratov, a Canadian, has been charged with working for two members of the Federal Security Service of the Russian Federation. In his work for the FSB, Baratov hacked into 80 accounts, as well as a total of over 11,000 webmail accounts since 2010. Baratov also provided hacking services that enabled access to accounts with Google, Yahoo, and Yandex, via the use of spear-phishing through custom content and a malicious link.

For his activities, Baratov has pled guilty to a total of nine counts. One count, for aggravated identity theft, has a mandatory sentence of two years, while each of the other eight counts could net him 10 years in jail and a fine of $250,000. However, the federal sentencing guidelines established in the United States could reduce the final sentence considerably.

While it is nice to see those responsible for cybercrime paying their dues, it is even better for certain cybercrimes to be prevented in the first place. AspireTech can help your business with that. Call us at 469-272-0777 .

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 09 August 2020
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Cloud Network Security Hosted Solutions Privacy Productivity Hackers Email Innovation Efficiency Malware Backup Internet Mobile Devices Data VoIP Google Business Workplace Tips Data Backup Microsoft Hardware IT Support IT Services communications Data Recovery Software Disaster Recovery User Tips Outsourced IT Managed IT Services Smartphones Business Continuity Cybersecurity Phishing Computer Internet of Things Small Business Cloud Computing Communication Productivity Upgrade Network Collaboration Android Saving Money Managed IT Services Miscellaneous Server Browser Gadgets Business Management Smartphone BDR Windows Mobile Device Tech Term IT Support Save Money Artificial Intelligence Ransomware Windows 10 Automation Social Media Cybercrime Users Chrome Office Passwords Windows 10 Quick Tips Virtualization Holiday Computers Managed Service Bandwidth Facebook Mobility BYOD Microsoft Office Managed IT Employer-Employee Relationship Mobile Device Management Information Training Networking Windows 7 Office 365 Social Engineering Spam Telephone Systems Encryption Data Security Avoiding Downtime Recovery Information Technology Blockchain Mobile Office Wi-Fi Managed Service Provider Remote Monitoring Operating System How To Remote Work Mobile Computing Applications Two-factor Authentication Compliance Data Breach Wireless History Firewall Router Redundancy Big Data Apps Telephone System Private Cloud Website Help Desk Human Resources Application Patch Management Data Storage Alert Health Money Business Intelligence Meetings Mouse Budget Access Control Hacking Word Data Protection Servers Paperless Office Government Gmail VPN Business Technology Software as a Service Vendor Management Settings Proactive IT App Marketing Hacker Machine Learning Education Manufacturing Voice over Internet Protocol Managed Services Provider Identity Theft Apple Downtime Data Management Staff Vulnerability Bring Your Own Device Virtual Private Network Remote Computing User Error Display Infrastructure IT Management Risk Management Analysis Document Management Google Drive Office Tips Biometrics Employee/Employer Relationship Sports Connectivity File Sharing Lithium-ion battery Law Enforcement The Internet of Things HIPAA WiFi Healthcare Telephony SaaS Digital Signage CES Virtual Assistant Update Smart Tech Keyboard Data loss YouTube GDPR Fax Server Cables Black Market Saving Time Google Docs USB Content Management Spam Blocking Covid-19 Procurement HaaS Environment Content Filtering Solid State Drive Humor Network Congestion Wireless Technology Cleaning Printers Credit Cards Professional Services eWaste Data storage Streaming Media IT solutions Virtual Reality Scam Value Windows Server 2008 Processor Fraud Vendor Audit Entertainment Shadow IT Password Project Management Hard Drive Social Business Owner Running Cable Regulations Workers Going Green Cryptocurrency Botnet IT Plan Internet Exlporer Comparison DDoS Save Time Unsupported Software Public Cloud Augmented Reality Hard Drives Robot Work/Life Balance OneNote Safety Retail Customer Service Fiber-Optic Leadership IT solutions Supply Chain Management Antivirus Search Engine Hypervisor iPhone Operations Distribution Charger Bluetooth IT Assessment IT service Investment Telecommuting Content Filter Electronic Health Records Skype Managed Services Bing IaaS Files Google Search Projects Logistics Analyitcs Insurance Hosted Solution Screen Mirroring Unified Threat Management HBO OneDrive Domains NarrowBand E-Commerce ROI Storage Unified Communications webinar Start Menu Colocation Net Neutrality Computing Practices Cast Computer Care Frequently Asked Questions Uninterrupted Power Supply Copiers Camera Twitter Theft HVAC Conferencing Mobile Windows 10s Peripheral Shortcuts Employee/Employer Relationships Computing Infrastructure ISP Fiber Optics Biometric Security Multi-Factor Security Hosted Computing Science Samsung Tip of the week Development Chromecast Windows Server 2008 R2 Addiction eCommerce Bitcoin Virtual Desktop Cortana Enterprise Content Management Quick Tip File Versioning Trend Micro Proactive 5G Trending Inventory Windows 8 Cache Tech Support Messaging Batteries Google Apps Password Management Tools Digital Signature PCI DSS Outlook WIndows 7 End of Support Multiple Versions Shopping Remote Monitoring and Maintenance OLED Bloatware Lifestyle Tablet Transportation Data Warehousing Amazon Wireless Internet SMS Remote Workers NIST Strategy Computer Fan Policy Wearable Technology Monitor Internet exploMicrosoft Restore Data Social Network Line of Business Cabling Entrepreneur Authentication Amazon Web Services Wire Legal AI Warranty Azure Security Cameras Managed IT Service Maintenance Password Manager FENG Procedure Consultant Advertising Backup and Disaster Recovery Printing MSP Default App Nanotechnology Tablets Online Shopping Smart Office Current Events Contracts Laptop Printer RMM Social Networking Relocation Business Analytics Business Mangement Safe Mode Travel Accountants FinTech Best Available Electronic Medical Records User Notifications Cryptomining Personal Proactive Maintenance Specifications Evernote Knowledge Flash Emails Remote SharePoint Touchpad Administrator Smart Devices Distributed Denial of Service Smartwatch Using Data Shortcut Recycling Excel Software Tips Managing Stress PDF Business Cost Remote Worker Remote Maintenance Millennials Devices Memory Customer Relationship Management Wireless Charging Students IT Consultant Sync Instant Messaging Webinar Video Conferencing Microchip Virtual Machine Employee Window 10 Criminal Database IoT Root Cause Analysis Physical Security Best Practice Digitize Wiring IT Infrastructure Programming Workforce Thought Leadership