Skip to main content

MIRAI BOTNET CREATORS HELPING FBI FIGHT CYBERCRIME TO STAY OUT OF JAIL. Automated Publishing Via Osuta Yusuf Trigger. Three young hackers who were sentenced late last year for creating and spreading the notorious Mirai Botnet are now helping the FBI to investigate other "complex" cybercrime cases in return to avoid their lengthy prison terms. Paras Jha, 21 from New Jersey, Josiah White, 20 from Washington, and Dalton Norman, 21 from Louisiana, plead guilty in December 2017 to multiple charges for their role in creating and hijacking hundreds of thousands IoP devices to make them part of a notorious botnet network dubbed Mirai. Mirai malware scanned for insecure routers, cameras, DVRs, and other Internet of Things (IoT) devices which were using their default passwords and then made them part of a Botnet Network. The trio developed the Mirai botnet to attack rival Minecraft video gaming hosts, but after realizing that their invention was powerful enough to launch Record-breaking DDoS attack against targets like OVH hosting website, they released the Source Code of Mirai. The release of source code eventually led to more cyber attacks conducted by various criminals against websites and Internet infrastructure, one of which was the popular DNS Provider Dyn which made much of the Internet unusable on the East Coast in October 2016. The Mirai botnet attacks were then investigated by the FBI in 2017, and the cybercriminals were sentenced by the Chief U.S. District Judge in Alaska in December 2017. Hackers Assisting FBI As Part Of Their Sentencing However, after U.S. prosecutors announced Tuesday that the men had provided "extensive" and "exceptional" assistance to a dozen or more different law enforcement, a federal judge in Alaska sentenced each of the three men to just five years of probation—no prison sentence. The trio has also been ordered to pay $127,000 in restitution, serve 2,500 hours of community service, and has voluntarily handed over significant amounts of cryptocurrency seized during the investigation into their activities. According to court documents filed last week, Jha, White, and Norman have been working with the FBI for more than a year and will continue to cooperate with the agency. In one instance, prosecutors called out the trio's assistance in the 2017 takedown of the Kelihos Botnet —a global network of more than 100,000 infected computers used to deliver spam, steal login passwords, and infect other computers with ransomware and various malware. In March, the three hackers also helped law enforcement stop the Memcached-basedDDoS attack, a tool that helped criminals launch over 51000 times powerful DDoS attack than its original strength against their targets. "Cybercrime is a worldwide epidemic that reaches many Alaskans. The perpetrators count on being technologically one step ahead of law enforcement officials," said U.S. Attorney Bryan Schroder. "The plea agreement with the young offenders, in this case, was a unique opportunity for law enforcement officers, and will give FBI investigators the knowledge and tools they need to stay ahead of cybercriminals around the world." Schroder concluded that cybercriminals often develop their technical skills at a young age, and this case demonstrates the government's commitment to "hold criminals accountable while encouraging offenders to choose a different path to apply their skills."

Automated Publishing Via Osuta Yusuf Trigger.

Three young hackers who were sentenced late last year for creating and spreading the notorious Mirai Botnet are now helping the FBI to investigate other "complex" cybercrime cases in return to avoid their lengthy prison terms.

Paras Jha, 21 from New Jersey, Josiah White, 20 from Washington, and Dalton Norman, 21 from Louisiana, plead guilty in December 2017 to multiple charges for their role in creating and hijacking hundreds of thousands IoP devices to make them part of a notorious botnet network dubbed Mirai.

Mirai malware scanned for insecure routers, cameras, DVRs, and other Internet of Things (IoT) devices which were using their default passwords and then made them part of a Botnet Network.

The trio developed the Mirai botnet to attack rival Minecraft video gaming hosts, but after realizing that their invention was powerful enough to launch Record-breaking DDoS attack against targets like OVH hosting website, they released the Source Code of Mirai.

The release of source code eventually led to more cyber attacks conducted by various criminals against websites and Internet infrastructure, one of which was the popular DNS Provider Dyn which made much of the Internet unusable on the East Coast in October 2016.

The Mirai botnet attacks were then investigated by the FBI in 2017, and the cybercriminals were sentenced by the Chief U.S. District Judge in Alaska in December 2017.

Hackers Assisting FBI As Part Of Their Sentencing

However, after U.S. prosecutors announced Tuesday that the men had provided "extensive" and "exceptional" assistance to a dozen or more different law enforcement, a federal judge in Alaska sentenced each of the three men to just five years of probation—no prison sentence.

The trio has also been ordered to pay $127,000 in restitution, serve 2,500 hours of community service, and has voluntarily handed over significant amounts of cryptocurrency seized during the investigation into their activities.

According to court documents filed last week, Jha, White, and Norman have been working with the FBI for more than a year and will continue to cooperate with the agency.

In one instance, prosecutors called out the trio's assistance in the 2017 takedown of the Kelihos Botnet —a global network of more than 100,000 infected computers used to deliver spam, steal login passwords, and infect other computers with ransomware and various malware.

In March, the three hackers also helped law enforcement stop the Memcached-basedDDoS attack, a tool that helped criminals launch over 51000 times powerful DDoS attack than its original strength against their targets.

"Cybercrime is a worldwide epidemic that reaches many Alaskans. The perpetrators count on being technologically one step ahead of law enforcement officials," said U.S. Attorney Bryan Schroder.

"The plea agreement with the young offenders, in this case, was a unique opportunity for law enforcement officers, and will give FBI investigators the knowledge and tools they need to stay ahead of cybercriminals around the world."

Schroder concluded that cybercriminals often develop their technical skills at a young age, and this case demonstrates the government's commitment to "hold criminals accountable while encouraging offenders to choose a different path to apply their skills."

Comments

Popular posts from this blog

UGANDA ELECTORAL COMMISSION TO ELIMINATE NATIONAL IDENTIFICATION CARDS (IDs) FOR 2021 GENERAL ELECTIONS.

The elimination of using National IDs (Ndagamuntu) for the 2021 elections should not have come as a surprise. One would be very NAIVE to think that Bobi Wine has not prepared for this in his Business Plan under the RISK section. It is public knowledge that our EC is not independent.  It is also public knowledge that Military Dictator Yoweri Museveni will never lose an election. What stunned us this morning is when we noticed that on social media, people were mocking Bobi with his "get your Ndagamuntu".  We are on record for saying to all Our readers that the National ID is like Apartheid in South Africa. Students of History would know how those IDs were being used to arrest people, deny them jobs, deny them basic services. Consequently, Bobi was not wrong and will never be wrong on the Ndagamuntu. Except the ones attacking him and mocking him forget that in Uganda, now, no National ID (Ndagamuntu), no service.  If you have not been denied registering your child i...

Here is Why Our Utterances For Praying Jesus And God To Come Liberate Ugandans, May Be Misplaced. This Phrase is like inform of a Letter To Some Categorized Section Of Ugandans.

https://m.facebook.com/yusufosuta/photos/a.1896701010557789/2070383359856219/?type=3 OPEN LETTER TO NRM SUPPORTERS - NATIONAL ROBBERS MOVEMENT. .................................................................................. Last week of March, a friend told me to pray for Uganda.  I told him that he was an Idiot and we have prayed for too long and we are still hungry and sick and Jesus is not coming soon to liberate us. He then ignored the STUPID and sent me a picture we all now know.  It got me totally messed up.  This guy was telling me to pray then sends a picture of men bowing down in blood.  He might have meant guns but I blocked him because his utterances of praying for Uganda were misplaced. I unblocked him 3 weeks later and asked him about praying and assassinations.  His reply "eithrr prayers or guns or both". I hate violence with a passion.  So he is now blocked in like FOREVER. Do you feel safe?  Do not feel safe. Uganda regim...

The Full List of Permanent Secretaries Appointed by President Museveni.

By virtue of the Powers given to the President by Article 174 (2) of the 1995 Constitution of the Republic of Uganda, I hereby, appoint the following as Permanent Secretaries as indicated below: 1. Head of Public Service and Secretary to Cabinet- Lucy Nakyobe 2. Deputy Head of Public Service And Secretary to Cabinet - Deborah Katuramu 3. State House Comptroller - Jane Barekye 4. Principal Private Secretary to the President- Dr. Kenneth Omona 5. Principal Private Secretary to H.E. the Vice President - Alex Kakooza 6.  Office of the Prime Minister - Keith Muhakanizi 7.  Office of the President - Yunus Kakande 8.  Ministry of Agriculture, Animal - Industry and Fisheries David Kyomukama Kasura (Maj. Gen.) 9.  Ministry of Defence and Veteran Affairs- Rosette Byengoma 10. Ministry of Education and Sports -       Kate Lamaro  11. Ministry of Energy and Mineral Development -   Batebe Irene  12. Ministry of Foreign Affairs - Vincent Bag...