Male Rep 2


 "Customer's perception is our reality"

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

Perpetrators of Three Major Cyber Crimes Have Pled Guilty

Perpetrators of Three Major Cyber Crimes Have Pled Guilty

Every so often, it’s nice to hear about when the good guys win and cybercriminals get their comeuppance. Three such cybercriminals have entered guilty pleas to charges related to major cybersecurity events.

Mirai was a malware strain that creates a botnet out of enslaved Internet of Things devices. By leveraging the resources of these IoT devices, Mirai took down networks and websites. 20 and 21-year-olds Josiah White and Paras Jha have pled guilty for developing and leveraging Mirai.

The duo were co-founders of Protraf Solutions LLC, a company that would mitigate DDoS attacks. Their business model was to sell their solutions to their DDoS victims, or use the DDoS attack the old-fashioned way: as a means of collecting ill-gotten monies from those desperate enough to pay them to stop the attack. Along with 21-year-old Dalton Norman, White and Jha also used Mirai to power a click fraud scheme that net them about 200 Bitcoin, Norman alone netting 30.

Mirai ultimately went on to power one of the biggest attacks the world has ever seen, using IoT devices to take down Dyn, causing many major websites to go down.

Ultimately, the three young malware developers were each charged with click fraud conspiracy, earning each a $250,000 fine and a stay of up to five years in prison. Jha and White plead guilty to conspiracy charges for writing and using Mirai and were each sentenced to an additional 5 years in prison and $250,000 fine, as well as three years of supervised release.

NSA Data
An employee of the National Security Agency, Nghia Hoang Pho, pled guilty on December 17, 2017, to a charge of “willful retention of national defense information.” According to the United States Justice Department, Pho was hired in 2006 as a developer for the Tailored Access Operations unit. The Tailored Access Operations unit, or TAO unit, creates specialized hacking tools that are used to collect data from the information systems used by overseas targets.

Between 2010 and March of 2015, Pho removed classified data and stored it on his home computer, which utilized antivirus software from Kaspersky Lab. Kaspersky Lab is suspected of having been exploited by Russian hackers to steal documents, perhaps including the ones Pho removed and saved at home.

The United States Department of Homeland Security has since issued a directive that bans the use of Kaspersky software in federal agencies. Pho could face up to 10 years in prison and is scheduled for sentencing on April 6.

One of four men who faced indictment in March of 2017 has pled guilty to hacking into Yahoo and exposing the usernames, passwords, and account information for essentially every Yahoo user, with the number of victims counting to about one billion.

22-year-old Karim Baratov, a Canadian, has been charged with working for two members of the Federal Security Service of the Russian Federation. In his work for the FSB, Baratov hacked into 80 accounts, as well as a total of over 11,000 webmail accounts since 2010. Baratov also provided hacking services that enabled access to accounts with Google, Yahoo, and Yandex, via the use of spear-phishing through custom content and a malicious link.

For his activities, Baratov has pled guilty to a total of nine counts. One count, for aggravated identity theft, has a mandatory sentence of two years, while each of the other eight counts could net him 10 years in jail and a fine of $250,000. However, the federal sentencing guidelines established in the United States could reduce the final sentence considerably.

While it is nice to see those responsible for cybercrime paying their dues, it is even better for certain cybercrimes to be prevented in the first place. TWINTEL Solutions can help your business with that. Call us at (888) 894-6411.

Credit Card and Identity Theft and What to Do If I...
Today is the 10th Anniversary of Data Privacy Day


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, November 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!


Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Hackers Network Security Business Computing Backup Malware Hosted Solutions Mobile Devices Data Google VoIP Business Microsoft roundup Disaster Recovery nonprofit Software Email bgc Innovation Internet Managed IT Services Business Continuity Alert communications Hardware Outsourced IT Smartphones IT Services Managed IT Services Windows 10 Browser Data Backup Tech Term User Tips Saving Money Computer Ransomware Server Efficiency Cloud Computing Cybercrime Android Data Recovery Network Internet of Things IT Support BDR Computers Workplace Tips Business Management Smartphone Small Business Productivity Quick Tips Windows Passwords Office Productivity Miscellaneous Save Money IT Support Communication Artificial Intelligence Managed IT Chrome Telephone Systems Money Social Engineering BYOD Recovery Cybersecurity Applications Mobile Device Management Phishing Firewall Windows 10 Mobility Work/Life Balance Vulnerability Social Media Virtualization Gadgets Collaboration Hacking Upgrade Law Enforcement Facebook Automation Router Information Budget Office Tips Flexibility Avoiding Downtime Managed Service Provider App Two-factor Authentication VPN Health Wi-Fi Password Proactive IT Holiday Microsoft Office Data Protection Private Cloud Office 365 Remote Monitoring Bandwidth Bring Your Own Device How To Compliance Mobile Computing Data Security History Servers Black Market Identity Theft Connectivity Operating System Safety Apps Data Breach Business Intelligence Mobile Device Keyboard Word Redundancy Spam Remote Computing Scam Value Google Drive Sports Information Technology HaaS Risk Management Unified Threat Management Spam Blocking Comparison Physical Security IT Plan SaaS Wireless Technology Update Automobile CES Hiring/Firing Cleaning YouTube Managed Service Training Workers Encryption End of Support Credit Cards USB WiFi Data Management Content Management Computer Care Data storage Battery Content Filtering Patch Management Entertainment Windows 7 Fraud OneNote Blockchain Virtual Assistant Samsung The Internet of Things Business Owner Charger Settings Emergency Unsupported Software PDF Big Data Data Storage Government Website Telephone System Computing Infrastructure Solid State Drive Document Management Electronic Medical Records Marketing Infrastructure Paperless Office IT Management Voice over Internet Protocol Legal Worker HIPAA Software as a Service Save Time Employer-Employee Relationship Hosted Computing Remote Worker Start Menu Unified Communications Users Password Manager Machine Learning Benefits Knowledge Rootkit Online Shopping Hosted Solution Cache Apple Multi-Factor Security Best Practice Content Digital Signature Going Green Microchip Tip of the week Internet Exlporer Search Warranty FENG Data loss Cryptocurrency Politics Inventory Wiring Windows 10s Tools Theft Virtual Reality Business Mangement HVAC Smart Technology Network Congestion HBO Specifications Flash Evernote Wireless Internet iPhone Trending Audiobook Search Engine Windows Server 2008 How to Devices Printer Screen Mirroring Safe Mode Employer Employee Relationship webinar Access Control Public Cloud Worker Commute Gmail Networking Two Factor Authentication Outlook User Error Millennials Accountants MSP Vendor Management Sync Wireless Wireless Charging Cortana Wire IBM Downtime Data Warehousing Lifestyle Video Games Reputation Bing Advertising Troubleshooting Thought Leadership Mouse Assessment Cast Google Docs Computer Accessories Conferencing Workforce Scalability Experience Authentication Mobile Hard Drives Recycling Enterprise Content Management IT Consultant Monitor Colocation File Sharing Telephony Fiber-Optic Education Google Apps Smart Office Supercomputer Robot Laptop Customers Help Desk Regulations Amazon Twitter Administrator Television CrashOverride Chromecast Human Resources Bluetooth Netflix Frequently Asked Questions Telecommuting Nanotechnology Camera Audit Relocation Professional Services Techology eWaste Password Management Leadership Practices Augmented Reality Skype Cables Transportation Current Events Software Tips Files Touchpad Amazon Web Services Shadow IT Books Addiction Public Computer Staff Regulation Excel Hacker Remote Work Instant Messaging Smart Tech Printers Loyalty Computer Fan NarrowBand Meetings Humor Criminal NIST GDPR Thank You E-Commerce Congratulations nonprofits