Skip to main content

MIRAI BOTNET CREATORS HELPING FBI FIGHT CYBERCRIME TO STAY OUT OF JAIL. Automated Publishing Via Osuta Yusuf Trigger. Three young hackers who were sentenced late last year for creating and spreading the notorious Mirai Botnet are now helping the FBI to investigate other "complex" cybercrime cases in return to avoid their lengthy prison terms. Paras Jha, 21 from New Jersey, Josiah White, 20 from Washington, and Dalton Norman, 21 from Louisiana, plead guilty in December 2017 to multiple charges for their role in creating and hijacking hundreds of thousands IoP devices to make them part of a notorious botnet network dubbed Mirai. Mirai malware scanned for insecure routers, cameras, DVRs, and other Internet of Things (IoT) devices which were using their default passwords and then made them part of a Botnet Network. The trio developed the Mirai botnet to attack rival Minecraft video gaming hosts, but after realizing that their invention was powerful enough to launch Record-breaking DDoS attack against targets like OVH hosting website, they released the Source Code of Mirai. The release of source code eventually led to more cyber attacks conducted by various criminals against websites and Internet infrastructure, one of which was the popular DNS Provider Dyn which made much of the Internet unusable on the East Coast in October 2016. The Mirai botnet attacks were then investigated by the FBI in 2017, and the cybercriminals were sentenced by the Chief U.S. District Judge in Alaska in December 2017. Hackers Assisting FBI As Part Of Their Sentencing However, after U.S. prosecutors announced Tuesday that the men had provided "extensive" and "exceptional" assistance to a dozen or more different law enforcement, a federal judge in Alaska sentenced each of the three men to just five years of probation—no prison sentence. The trio has also been ordered to pay $127,000 in restitution, serve 2,500 hours of community service, and has voluntarily handed over significant amounts of cryptocurrency seized during the investigation into their activities. According to court documents filed last week, Jha, White, and Norman have been working with the FBI for more than a year and will continue to cooperate with the agency. In one instance, prosecutors called out the trio's assistance in the 2017 takedown of the Kelihos Botnet —a global network of more than 100,000 infected computers used to deliver spam, steal login passwords, and infect other computers with ransomware and various malware. In March, the three hackers also helped law enforcement stop the Memcached-basedDDoS attack, a tool that helped criminals launch over 51000 times powerful DDoS attack than its original strength against their targets. "Cybercrime is a worldwide epidemic that reaches many Alaskans. The perpetrators count on being technologically one step ahead of law enforcement officials," said U.S. Attorney Bryan Schroder. "The plea agreement with the young offenders, in this case, was a unique opportunity for law enforcement officers, and will give FBI investigators the knowledge and tools they need to stay ahead of cybercriminals around the world." Schroder concluded that cybercriminals often develop their technical skills at a young age, and this case demonstrates the government's commitment to "hold criminals accountable while encouraging offenders to choose a different path to apply their skills."

Automated Publishing Via Osuta Yusuf Trigger.


Three young hackers who were sentenced late last year for creating and spreading the notorious Mirai Botnet are now helping the FBI to investigate other "complex" cybercrime cases in return to avoid their lengthy prison terms.


Paras Jha, 21 from New Jersey, Josiah White, 20 from Washington, and Dalton Norman, 21 from Louisiana, plead guilty in December 2017 to multiple charges for their role in creating and hijacking hundreds of thousands IoP devices to make them part of a notorious botnet network dubbed Mirai.


Mirai malware scanned for insecure routers, cameras, DVRs, and other Internet of Things (IoT) devices which were using their default passwords and then made them part of a Botnet Network.


The trio developed the Mirai botnet to attack rival Minecraft video gaming hosts, but after realizing that their invention was powerful enough to launch Record-breaking DDoS attack against targets like OVH hosting website, they released the Source Code of Mirai.


The release of source code eventually led to more cyber attacks conducted by various criminals against websites and Internet infrastructure, one of which was the popular DNS Provider Dyn which made much of the Internet unusable on the East Coast in October 2016.


The Mirai botnet attacks were then investigated by the FBI in 2017, and the cybercriminals were sentenced by the Chief U.S. District Judge in Alaska in December 2017.


Hackers Assisting FBI As Part Of Their Sentencing


However, after U.S. prosecutors announced Tuesday that the men had provided "extensive" and "exceptional" assistance to a dozen or more different law enforcement, a federal judge in Alaska sentenced each of the three men to just five years of probation—no prison sentence.


The trio has also been ordered to pay $127,000 in restitution, serve 2,500 hours of community service, and has voluntarily handed over significant amounts of cryptocurrency seized during the investigation into their activities.


According to court documents filed last week, Jha, White, and Norman have been working with the FBI for more than a year and will continue to cooperate with the agency.


In one instance, prosecutors called out the trio's assistance in the 2017 takedown of the Kelihos Botnet —a global network of more than 100,000 infected computers used to deliver spam, steal login passwords, and infect other computers with ransomware and various malware.


In March, the three hackers also helped law enforcement stop the Memcached-basedDDoS attack, a tool that helped criminals launch over 51000 times powerful DDoS attack than its original strength against their targets.


"Cybercrime is a worldwide epidemic that reaches many Alaskans. The perpetrators count on being technologically one step ahead of law enforcement officials," said U.S. Attorney Bryan Schroder.




"The plea agreement with the young offenders, in this case, was a unique opportunity for law enforcement officers, and will give FBI investigators the knowledge and tools they need to stay ahead of cybercriminals around the world."




Schroder concluded that cybercriminals often develop their technical skills at a young age, and this case demonstrates the government's commitment to "hold criminals accountable while encouraging offenders to choose a different path to apply their skills."


Comments

Popular posts from this blog

Escaped Murder Suspect Finally Arrested in Yumbe Regional Referral Hospital, Yumbe District.

Story by Osuta Yusuf. 19-November-2024. 📸: Eyotre Kennedy handcuffed on bed while receiving medication this morning at Yumbe Regional Referral Hospital in Yumbe District. Eyotre Kennedy originating from Etoko village, Nyoroo Parish, Nyadri Sub-county in Maracha District who has for many years been terrorizing residents in his village, has finally been arrested this Monday morning 19-November-2024 while receiving treatment at Yumbe Regional Referral Hospital in Yumbe District following injuries he sustained from Theft mission on Saturday night 16-November-2024 in Owapi village, Azapi parish in Odupi Sub-county, Terego East Constituency in Terego District. Click here on the link  https://informationispowah.blogspot.com/2024/11/fugitive-who-chopped-3-people-killed.html   to read the story on his Theft of Goats in Terego. Upon getting cut on the finger and leg by the Mob as he attempted to fight and overpower owner of the goats he attempted to steal on Saturday night ...

41-Years-Old Man Digs His Own Grave in Maracha District.

Story by Osuta Yusuf.  Maracha District.  📸: The grave been dug by Mr Opiga Michael, a victim of frustration. Photo taken by Osuta Yusuf , on Wednesday 11-September-2024. The residents of Ebapi village, Baria Parish in Nyadri Sub-county, Maracha east constituency, Maracha District are in shock after a 41 year old man started digging his own grave. The man, identified as Mr Opiga Michael, who seems to be frustrated over some challenges in life, started digging his own grave on Tuesday 10-September-2024 until he was stopped by the elders in Nyaria clan. 📸: Opiga Michael, the Victim of Frustration. Photo by Osuta Yusuf , Information is Power. While speaking to our reporter on Wednesday evening 11-September-2024, Mr Opiga Michael, said, his main plan  was to commit suicide after finishing digging the grave for burying himself, explained that, he feels frustrated, abandoned and hated by his own clan people, whom he accused of piling lies against him a...

Wedded Ayivu West MP Lematia John Fights Over Another Woman.

  📸: Hon Lematia John. By URN. Police in Arua district are investigating a case of assault and threatening violence involving the Member of Parliament for Ayivu West Constituency John Lematia and James Ariko, a DSTV technician in Arua city. Drama ensued on Easter Sunday 31-3-2024 at Dream Land Hotel located at Kuluva trading center along Arua-Nebbi highway in Arua district when the legislator and the technician engaged in a fight reportedly over a woman identified as Faith Eyotaru 25, a relationship officer at Victoria University Kampala. The scuffle started after Ayivu West Mp John Lematia went to swim at Dreamland Hotel with Faith Eyotaru only to find Ariko, who had gone to the same hotel earlier. However, upon seeing the duo coming out of the vehicle, Ariko confronted Lematia with both men claiming to be having a relationship with the lady. It took the intervention of the staff at the hotel who intervened and separated the fight between the men. Josephine Angucia, the West Nil...