(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Perpetrators of Three Major Cyber Crimes Have Pled Guilty

Perpetrators of Three Major Cyber Crimes Have Pled Guilty

Every so often, it’s nice to hear about when the good guys win and cybercriminals get their comeuppance. Three such cybercriminals have entered guilty pleas to charges related to major cybersecurity events.

Mirai
Mirai was a malware strain that creates a botnet out of enslaved Internet of Things devices. By leveraging the resources of these IoT devices, Mirai took down networks and websites. 20 and 21-year-olds Josiah White and Paras Jha have pled guilty for developing and leveraging Mirai.

The duo were co-founders of Protraf Solutions LLC, a company that would mitigate DDoS attacks. Their business model was to sell their solutions to their DDoS victims, or use the DDoS attack the old-fashioned way: as a means of collecting ill-gotten monies from those desperate enough to pay them to stop the attack. Along with 21-year-old Dalton Norman, White and Jha also used Mirai to power a click fraud scheme that net them about 200 Bitcoin, Norman alone netting 30.

Mirai ultimately went on to power one of the biggest attacks the world has ever seen, using IoT devices to take down Dyn, causing many major websites to go down.

Ultimately, the three young malware developers were each charged with click fraud conspiracy, earning each a $250,000 fine and a stay of up to five years in prison. Jha and White plead guilty to conspiracy charges for writing and using Mirai and were each sentenced to an additional 5 years in prison and $250,000 fine, as well as three years of supervised release.

NSA Data
An employee of the National Security Agency, Nghia Hoang Pho, pled guilty on December 17, 2017, to a charge of “willful retention of national defense information.” According to the United States Justice Department, Pho was hired in 2006 as a developer for the Tailored Access Operations unit. The Tailored Access Operations unit, or TAO unit, creates specialized hacking tools that are used to collect data from the information systems used by overseas targets.

Between 2010 and March of 2015, Pho removed classified data and stored it on his home computer, which utilized antivirus software from Kaspersky Lab. Kaspersky Lab is suspected of having been exploited by Russian hackers to steal documents, perhaps including the ones Pho removed and saved at home.

The United States Department of Homeland Security has since issued a directive that bans the use of Kaspersky software in federal agencies. Pho could face up to 10 years in prison and is scheduled for sentencing on April 6.

Yahoo
One of four men who faced indictment in March of 2017 has pled guilty to hacking into Yahoo and exposing the usernames, passwords, and account information for essentially every Yahoo user, with the number of victims counting to about one billion.

22-year-old Karim Baratov, a Canadian, has been charged with working for two members of the Federal Security Service of the Russian Federation. In his work for the FSB, Baratov hacked into 80 accounts, as well as a total of over 11,000 webmail accounts since 2010. Baratov also provided hacking services that enabled access to accounts with Google, Yahoo, and Yandex, via the use of spear-phishing through custom content and a malicious link.

For his activities, Baratov has pled guilty to a total of nine counts. One count, for aggravated identity theft, has a mandatory sentence of two years, while each of the other eight counts could net him 10 years in jail and a fine of $250,000. However, the federal sentencing guidelines established in the United States could reduce the final sentence considerably.

While it is nice to see those responsible for cybercrime paying their dues, it is even better for certain cybercrimes to be prevented in the first place. NTConnections can help your business with that. Call us at (703) 288-9767.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 18 February 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Hackers Business Computing Productivity Microsoft Backup Hosted Solutions Malware Internet Google Mobile Devices Efficiency VoIP Business IT Support Email Miscellaneous IT Services Managed Service Provider Innovation Server Disaster Recovery Business Continuity Workplace Tips Network Data Windows Upgrade Network Security Software Hardware Business Management Communication Computer Save Money Saving Money Mobile Device Management Virtualization Smartphones Android Browser Smartphone Microsoft Office User Tips Managed IT Services Holiday communications Data Backup Outsourced IT WiFi Windows 10 BYOD Small Business Computers Social Media Remote Monitoring Cybercrime Operating System Hacking Chrome Mobile Computing Alert Apple Proactive IT Avoiding Downtime Big Data Application IT Solutions Managed IT Services Quick Tips Ransomware Office Information Technology Budget Social Engineering Collaboration Employer-Employee Relationship Passwords Marketing Cloud Computing The Internet of Things Data Recovery Automation Gadgets Recovery Telephone Systems Mobility Health Bring Your Own Device VPN BDR Going Green Remote Computing spam Bandwidth iPhone Compliance Cybersecurity App Wireless Technology User Error Gmail Private Cloud How To Managed IT Save Time Firewall Vendor Management Two-factor Authentication Internet of Things Retail Memory Windows 10 Search Antivirus Vulnerability Data Security Networking Office Tips Analytics Router Lithium-ion battery Artificial Intelligence Business Intelligence PowerPoint Website Excel Phone System Mouse Content Filtering Money Downtime Redundancy IT Support History Tablet Document Management Office 365 Risk Management Data Management Value Workers Printer Internet Exlporer Mobile Office Customer Relationship Management Business Owner Data storage Biometrics OneNote Identity Theft Current Events Best Available eWaste People Maintenance Programming Hard Drives Credit Cards Network Congestion Work/Life Balance Trending Facebook Intranet Physical Security DDoS Humor Robot Statistics Public Cloud Data Storage Environment Google Drive Phishing Word Human Resources Outlook HIPAA SaaS Training Safety Flexibility Apps IT Consultant Government IT Management Meetings Administration Law Enforcement HaaS Fax Server Solid State Drive Saving Time IT Plan Black Market Entertainment Running Cable CES Online Currency Unsupported Software Skype Unified Threat Management Streaming Media Managing Stress Instant Messaging Cables Sync Colocation Shortcut Content Management Electronic Medical Records Update Windows 8 Remote Work Software Tips LinkedIn SharePoint Virus Encryption Unified Communications Hosted Solution Telephony Computing Infrastructure Print Server Sports Blockchain Bluetooth Google Docs Debate Legal Tablets Monitor Computer Accessories Notifications Theft Start Menu End of Support Audit YouTube Staff USB Voice over Internet Protocol Mobile Device Net Neutrality HBO Video Surveillance Computer Repair Reputation Wearable Technology Cameras Consultant Social Cortana Mobile Internet exploMicrosoft Screen Mirroring NarrowBand Root Cause Analysis Multi-Factor Security Education Fraud Frequently Asked Questions Customers Printer Server Best Practice Social Networking Google Apps Patch Management Professional Services Advertising Cast Chromecast Data loss Worker Commute Lifestyle Piracy Analyitcs Amazon Touchscreen Tip of the week User Infrastructure Scam Tools Laptop Settings Charger Data Protection Licensing Amazon Web Services Windows Server 2008 Samsung Distributed Denial of Service Virtual Desktop Password Manager Twitter Hybrid Cloud Touchpad IT service Computer Care Comparison Virtual Reality Online Shopping Windows 7 Crowdfunding Relocation Uninterrupted Power Supply Spam Blocking Business Mangement Botnet Data Warehousing Domains Specifications Bloatware Evernote Keyboard Regulations IaaS Cleaning Customer Service Recycling Travel Millennials Windows Media Player Entrepreneur Wireless Charging Servers Tech Support Computer Fan Criminal Workforce Hiring/Firing Applications Company Culture Hacker WIndows 7 Cost Management Fiber-Optic Flash Files Windows 8.1 Update Shadow IT FENG Productivity Software as a Service Password Telecommuting Wi-Fi Wireless Science Troubleshooting Techology Public Computer Employer Employee Relationship Automobile Data Breach Emails Books CrashOverride Users IBM Webinar Emergency Digital Signature Worker Content Supercomputer IT solutions Rootkit Video Games Audiobook Knowledge Netflix Scalability Politics Transportation How to webinar Benefits PDF Loyalty Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Television