Satori Botnet Creator Sentenced to 13 Months in Prison

栏目: IT技术 · 发布时间: 5年前

内容简介:The creator of the Satori/Okiru, Masuta and Tsunami/Fbot botnets has been sentenced to prison for compromising hundreds of thousands of devices.A 22-year-old man has been sentenced to more than a year in prison for developing Mirai botnet variants that com
Satori Botnet Creator Sentenced to 13 Months in Prison

The creator of the Satori/Okiru, Masuta and Tsunami/Fbot botnets has been sentenced to prison for compromising hundreds of thousands of devices.

A 22-year-old man has been sentenced to more than a year in prison for developing Mirai botnet variants that compromised hundreds of thousands of devices worldwide.

The man, Kenneth Currin Schuchman, of Vancouver, Wash., was sentenced to 13 months in prison after pleading guilty to creating and operating theSatori/Okiru,MasutaandTsunami/Fbot botnets. The botnets are considered “successors” toMirai, as they use the same source code as the infamous botnet.

Schuchman added additional features to the botnets over time, so that they grew more “complex and effective,” according to the Department of Justice (DoJ) on Thursday: “The defendant used the botnets to facilitate DDoS attacks, which occur when multiple computers acting in unison flood targeted computers with information to prevent them from being able to access the internet,” according to the DoJ’s press release .

Satori Botnet Creator Sentenced to 13 Months in Prison

Two of Schuchman’s criminal associates have also been charged for their roles in developing and operating these botnets to conduct distributed denial of service (DDoS) attacks, according to the DoJ. These associates are Aaron Sterritt, (also known by the alias “Vamp” or “Viktor”), who is a U.K. national, and Logan Shwydiuk, (known as “Drake”), a Canadian national.

Schuchman engaged in criminal botnet activity since at least August 2017, during which he both rented out the internet-of-things (IoT) botnets and operated them himself. Following his arrest in August 2018, Schuchman continued to engage in criminal botnet activity, and violated several other conditions of his pretrial release, the DoJ said.

Satori/Okiku was first identified by Check Point researchers inNovember 2017. In December 2017, researchers at Qihoo 360 Netlab said  Satori had infected more than 280,000 IP addresses in a 12-hour period and had gained control over 500,000 to 700,000 IoT devices. Then inDecember 2017, researchers identified a vulnerability in a Huawei home-router model that was being exploited to spread Satori/ Mirai Okiru. In 2018, researchers then linked the hacker behind Satori as the same one behind another botnet family, Masuta and PureMasuta.

All these botnets are variants to Mirai, which was used in the 2016 DDoS attacks that targetedDNS provider Dyn and caused several well-known websites – including Twitter, Spotify and Netflix – to go dark for hours. New Mirai variants continue to pop up, taking down technology such as routers, internet-based companies such as DNS providers, business sectors such as financial services, and horizontal players such as enterprise companies, to name a few.

The botnet activity continues as more insecure IoT devices hit the market, and as DDoS attacks grow. On June 21, in fact, Akamai said it mitigated the largest packet per second (PPS) DDoS attack ever recorded on its platform. The attack generated 809 million packets per second (Mpps), targeting a large European bank.

As part of his trial, Schuchman previously pleaded guilty to one count of fraud and related activity in connection with computers, in violation of the Computer Fraud and Abuse Act .  As part of his sentence, he has also been ordered to serve a term of 18 months of community confinement following his release from prison and a three year term of supervised release.


以上就是本文的全部内容,希望对大家的学习有所帮助,也希望大家多多支持 码农网

查看所有标签

猜你喜欢:

本站部分资源来源于网络,本站转载出于传递更多信息之目的,版权归原作者或者来源机构所有,如转载稿涉及版权问题,请联系我们

平台革命:改变世界的商业模式

平台革命:改变世界的商业模式

[美]杰奥夫雷G.帕克(Geoffrey G. Parker)、马歇尔W.范·埃尔斯泰恩(Marshall W. Van Alstyne)、桑基特·保罗·邱达利(Sangeet Paul Choudary) / 志鹏 / 机械工业出版社 / 2017-10 / 65.00

《平台革命》一书从网络效应、平台的体系结构、颠覆市场、平台上线、盈利模式、平台开放的标准、平台治理、平台的衡量指标、平台战略、平台监管的10个视角,清晰地为读者提供了平台模式最权威的指导。 硅谷著名投资人马克·安德森曾经说过:“软件正在吞食整个世界。”而《平台革命》进一步指出:“平台正在吞食整个世界”。以平台为导向的经济变革为社会和商业机构创造了巨大的价值,包括创造财富、增长、满足人类的需求......一起来看看 《平台革命:改变世界的商业模式》 这本书的介绍吧!

SHA 加密
SHA 加密

SHA 加密工具

UNIX 时间戳转换
UNIX 时间戳转换

UNIX 时间戳转换