Satori Botnet Creator Sentenced to 13 Months in Prison

栏目: IT技术 · 发布时间: 5年前

内容简介:The creator of the Satori/Okiru, Masuta and Tsunami/Fbot botnets has been sentenced to prison for compromising hundreds of thousands of devices.A 22-year-old man has been sentenced to more than a year in prison for developing Mirai botnet variants that com
Satori Botnet Creator Sentenced to 13 Months in Prison

The creator of the Satori/Okiru, Masuta and Tsunami/Fbot botnets has been sentenced to prison for compromising hundreds of thousands of devices.

A 22-year-old man has been sentenced to more than a year in prison for developing Mirai botnet variants that compromised hundreds of thousands of devices worldwide.

The man, Kenneth Currin Schuchman, of Vancouver, Wash., was sentenced to 13 months in prison after pleading guilty to creating and operating theSatori/Okiru,MasutaandTsunami/Fbot botnets. The botnets are considered “successors” toMirai, as they use the same source code as the infamous botnet.

Schuchman added additional features to the botnets over time, so that they grew more “complex and effective,” according to the Department of Justice (DoJ) on Thursday: “The defendant used the botnets to facilitate DDoS attacks, which occur when multiple computers acting in unison flood targeted computers with information to prevent them from being able to access the internet,” according to the DoJ’s press release .

Satori Botnet Creator Sentenced to 13 Months in Prison

Two of Schuchman’s criminal associates have also been charged for their roles in developing and operating these botnets to conduct distributed denial of service (DDoS) attacks, according to the DoJ. These associates are Aaron Sterritt, (also known by the alias “Vamp” or “Viktor”), who is a U.K. national, and Logan Shwydiuk, (known as “Drake”), a Canadian national.

Schuchman engaged in criminal botnet activity since at least August 2017, during which he both rented out the internet-of-things (IoT) botnets and operated them himself. Following his arrest in August 2018, Schuchman continued to engage in criminal botnet activity, and violated several other conditions of his pretrial release, the DoJ said.

Satori/Okiku was first identified by Check Point researchers inNovember 2017. In December 2017, researchers at Qihoo 360 Netlab said  Satori had infected more than 280,000 IP addresses in a 12-hour period and had gained control over 500,000 to 700,000 IoT devices. Then inDecember 2017, researchers identified a vulnerability in a Huawei home-router model that was being exploited to spread Satori/ Mirai Okiru. In 2018, researchers then linked the hacker behind Satori as the same one behind another botnet family, Masuta and PureMasuta.

All these botnets are variants to Mirai, which was used in the 2016 DDoS attacks that targetedDNS provider Dyn and caused several well-known websites – including Twitter, Spotify and Netflix – to go dark for hours. New Mirai variants continue to pop up, taking down technology such as routers, internet-based companies such as DNS providers, business sectors such as financial services, and horizontal players such as enterprise companies, to name a few.

The botnet activity continues as more insecure IoT devices hit the market, and as DDoS attacks grow. On June 21, in fact, Akamai said it mitigated the largest packet per second (PPS) DDoS attack ever recorded on its platform. The attack generated 809 million packets per second (Mpps), targeting a large European bank.

As part of his trial, Schuchman previously pleaded guilty to one count of fraud and related activity in connection with computers, in violation of the Computer Fraud and Abuse Act .  As part of his sentence, he has also been ordered to serve a term of 18 months of community confinement following his release from prison and a three year term of supervised release.


以上就是本文的全部内容,希望对大家的学习有所帮助,也希望大家多多支持 码农网

查看所有标签

猜你喜欢:

本站部分资源来源于网络,本站转载出于传递更多信息之目的,版权归原作者或者来源机构所有,如转载稿涉及版权问题,请联系我们

基于MVC的JavaScript Web富应用开发

基于MVC的JavaScript Web富应用开发

麦卡劳(Alex MacCaw) / 李晶、张散集 / 电子工业出版社 / 2012-5 / 59.00元

《JavaScript Web 富应用开发》Developing JavaScript Web Applications是 Alex MacCaw 的新作(由O'Reilly出版发行),本书系统而深入的讲解了如何使用最前沿的Web技术构建下一代互联网富应用程序。作者 Alex MacCaw 是一名Ruby/JavaScript 程序员,在开源社区中很有名望,是Spine框架的作者,同时活跃在纽约、......一起来看看 《基于MVC的JavaScript Web富应用开发》 这本书的介绍吧!

JS 压缩/解压工具
JS 压缩/解压工具

在线压缩/解压 JS 代码

html转js在线工具
html转js在线工具

html转js在线工具

UNIX 时间戳转换
UNIX 时间戳转换

UNIX 时间戳转换