croom new

Eclipse Integrated Systems Blog

Three Cybercrimes Have Ended in Guilty Pleas

Three Cybercrimes Have Ended in Guilty Pleas

When so much of what we write is about the threats and attacks that exist (and are carried out) in cyberspace, it is particularly refreshing when we can discuss those responsible for these attacks in the context of their legal proceedings. For example, today we are able to discuss how actors in some of the biggest recent cybersecurity events have entered guilty pleas.

As a malware strain that leveraged Internet of Things devices to create a zombified botnet and launch Distributed Denial of Service attacks, Mirai was responsible for no small amount of trouble on the Internet. Its developers, 20-year-old Josiah White and 21-year-old Paras Jha, have pled guilty to developing and leveraging Mirai to their own ends.

The two established a company called Protraf Solutions LLC, which was dedicated to mitigating DDoS attacks. Using this company in tandem with their creation, White and Jha would launch a DDoS attack against a company and then sell their solutions to that company, or would collect money through the other side, accepting payment from their victims to stop the attack. White and Jha also teamed up with an accomplice, 21-year-old Dalton Norman, to leverage Mirai as the driving force behind a click fraud scheme. This scheme alone brought them around 200 Bitcoin, with 30 going to Norman.

Mirai was also responsible for powering the DDoS attack on Dyn, one of the largest data centers east of the Mississippi River.

The trio was charged with click fraud conspiracy, each being sentenced to a five year stay in prison and a fine of $250,000. Jha and White were also charged with conspiracy for writing and using Mirai, to which they pled guilty. This added another five years to their time in prison, another $250,000 fine, along with three years of supervised release.

NSA Data
On December 17, 2017, an employee of the National Security Agency pled guilty to “willful retention of national defense information.” According to the United States Justice Department, Nghia Hoang Pho was hired as a developer for the Tailored Access Operations, or TAO, unit in 2006. The TAO unit was tasked with creating hacking tools to be used to collect data from overseas targets and their information systems.

In the time between 2010 and March of 2015, Pho took classified data and stored it on his home system. This system had antivirus software from Kaspersky Lab installed on it. There are suspicions that Russian hackers have exploited Kaspersky Lab in order to steal documents, quite possibly the ones taken home by Pho. The US Department of Homeland Security issued a directive that disallows the use of software made by Kaspersky Lab in federal agencies.

Pho faces up to 10 years in prison, and will stand for sentencing on April 6.

In March of 2017, four men faced indictment for hacking into Yahoo, effectively exposing the personal account information of one billion users. 22-year-old Karim Baratov has been charged with cooperating with two members of the FSB, or the Federal Security Service of the Russian Federation.

As part of his work for the FSB, the young Canadian hacked into 80 accounts, in addition to the more than 11,000 webmail accounts he had hacked since 2010. Utilizing customized spear-phishing content, Baratov also provided a service that granted access to Google, Yahoo, and Yantex accounts.

Baratov has entered a guilty plea for all nine counts he faces. The first count is for aggravated identity theft, and carries a mandatory sentence of two years. The other eight counts are for violating the Computer Fraud and Abuse Act, and could each carry a sentence of 10 years and a fine of $250,000. Fortunately for Baratov, the United States’ federal sentencing guidelines could shorten the amount of time spent in jail by no small measure.

While seeing those who committed cybercrimes face the music is satisfying, it is even better to know that you’re protected from becoming a victim of some similar plot. Eclipse Integrated Systems can help by providing the security solutions and training to help keep your business safe. Give us a call at 800-340-0505 to get started.

4 Skills Needed for IT Project Management Success
Tip of the Week: Learn How to Use the Microsoft Ed...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, February 24 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Privacy Cloud Network Security Internet Google Hackers User Tips Productivity Malware Software Microsoft Business Management Innovation Tech Term Efficiency Hosted Solutions Computer Backup Browser Email Business Windows 10 Cybersecurity Smartphones Mobile Devices Apps Managed IT Services Hardware Productivity Smartphone Communication Data Recovery Internet of Things Collaboration Passwords Windows Small Business Data Backup Saving Money Virtualization Cybercrime Holiday communications Data Security Android VoIP Mobility Network Law Enforcement Mobile Device IT Support Workplace Tips Wireless Disaster Recovery Business Continuity Ransomware Data Microsoft Office Operating System Windows 10 IT Support Miscellaneous Cloud Computing Office 365 Users IT Services Mobile Device Management Telephone Systems Chrome Server Wi-Fi Update Password BDR Gadgets Outsourced IT Quick Tips Money Phishing Social Media Application Facebook Information Technology App Unsupported Software Vulnerability Risk Management Health Upgrade Best Practice Google Drive Cost Management Employer-Employee Relationship Social Government Spam Automation Patch Management Managed Service Provider Work/Life Balance Alert Office tips Two-factor Authentication Streaming Media Shortcut Current Events Computers Information Bandwidth User Error Personal Information Networking USB Marketing Artificial Intelligence Antivirus Hacking Managed IT Services Data Management Managed IT Proactive IT Identity Theft Save Money Sports Blockchain Politics End of Support Battery Data Storage Apple Instant Messaging Data Protection Tech Support eWaste Private Cloud Word Gmail Remote Monitoring and Management Access Control Mobile Computing DDoS Applications Maintenance WiFi Transportation Medical IT HaaS Outlook G Suite Office iPhone Managing Stress Internet Exlporer Mobile Security Samsung OneNote Automobile The Internet of Things Cleaning Wireless Technology Storage Hosted Solution Excel Managed Service Business Intelligence Television Training BYOD Connectivity Legal Devices Cortana VPN Touchscreen Analytics Search Social Engineering Compliance Telephony Humor Audit Company Culture Save Time Flexibility Remote Computing Google Docs SaaS Commerce Router Wireless Charging Meetings Encryption Computer Care Recovery Going Green History Fraud Comparison Internet Explorer Microsoft Office 365 Safety Emails Books Adobe Microsoft Word Cables Microsoft Excel Identities Chromebook Reporting Unified Threat Management Experience Data Breach Avoiding Downtime Microsoft Teams Security Cameras WannaCry Text Messaging Credit Cards Payment A.I. Profitability Keyboard How To Edge Chromecast App store Vendor Management Point of Sale Screen Mirroring Specifications Threat Webinar Files Virus Voice over Internet Protocol File Sharing Language Printing Running Cable Upgrades Phone System Evernote Wearables Analysis IT Management Laptop Vulnerabilities Movies Eliminating Downtime SharePoint Windows Ink Ciminal Advertising Cast Sales PowerPoint Authentication Bluetooth Distributed Denial of Service IT solutions Video Games Licensing Device Security Proactive Robot Google Assistant GDPR Consultant Music Bring Your Own Device Scam Nanotechnology Identity IT Solutions FAQ Touchpad Cryptocurrency Wireless Internet Hiring/Firing iOS Reputation Google Maps Project Management Retail Data storage Authorization Fax Server Windows 10s Travel Trending Websites Amazon Virtual Reality Lithium-ion battery Value Dark Web Sync Workers Hybrid Cloud Employer Employee Relationship Root Cause Analysis Administrator Data Privacy Entertainment Charger Unified Communications Help Desk Teamwork Benefits Black Market Data Loss IT budget Settings Conferencing Healthcare Downloads Solid State Drive Tablets Spyware Data Theft Virtual Assistant Education Legislation Error Electronic Medical Records Big Data Updates Managed IT Service Computer Accessories Augmented Reality Access Hard Drive Wearable Technology WIndows Server 2008 Uninterrupted Power Supply Operating Sysytem RAM Certification Smart Technology Computer Fan PDF Worker Commute HBO Gifts E-Commerce Trends Troubleshooting Hacker Hard Disk Drive Scalability NFL Budget Computing Plug-In Relocation Remote Monitoring CrashOverride Emergency Monitors Disaster Worker Paperless Office Printers Twitter Regulation Cache

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login