Dear Visitor,

Our system has found that you are using an ad-blocking browser add-on.

We just wanted to let you know that our site content is, of course, available to you absolutely free of charge.

Our ads are the only way we have to be able to bring you the latest high-quality content, which is written by professional journalists, with the help of editors, graphic designers, and our site production and I.T. staff, as well as many other talented people who work around the clock for this site.

So, we ask you to add this site to your Ad Blocker’s "white list" or to simply disable your Ad Blocker while visiting this site.

Continue on this site freely
You are here: Home / Viruses & Malware / Mirai Botnet Creators Plead Guilty
Mirai Botnet Creators Plead Guilty To Hacking Charges
Mirai Botnet Creators Plead Guilty To Hacking Charges
By Andrew Blake Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
Three men have pleaded guilty to federal hacking charges connected to developing the malware at the center of a massive cyberattack that crippled internet access in the U.S. and Europe late last year.

Paras Jha, Josiah White and Dalton Norman have each pleaded guilty to violating the Computer Fraud and Abuse Act in relation to their roles operating two botnets, or networks of compromised computers, including the Mirai botnet that encompassed hundreds of thousands of infected internet-connected devices and helped cripple websites such as Netflix and Twitter, the Department of Justice announced Wednesday.

Mirai emerged in late 2016 and was the first significant botnet to target IoT, or "Internet of Things" devices -- non-traditional devices that are connected to the internet, including surveillance cameras and digital video recorders, Acting Deputy Assistant Attorney General Richard Downing told reporters on a conference call.

"At its peak it was one of the largest IoT botnets ever recorded," ultimately encompassing over 300,000 devices, said Mr. Downing, according to charging documents unsealed Wednesday.

Federal prosecutors said cybercriminals including the defendants harnessed IoT devices infected with Mirai and subsequently used them to conduct distributed denial-of-service (DDoS) attacks -- a rudimentary but effective method of disrupting websites by overloading them illegitimate internet traffic.

The defendants exploited Mirai for their own purposes starting in the summer of 2016, using their botnet to knock down websites and leasing it any times for financial gain.

Jha, a 20-year-old Rutgers University student and Mirai's main author, "conspired to conduct DDoS attacks against websites and web hosting companies located in the United States and abroad" and "demanded payment in exchange for halting the attack," according to court documents.

He published its source code online that December, and other cybercriminals ultimately used that code to conduct DDoS attacks of their own, according to his plea agreement.

Mirai was notably used in Dec. 2016 to wage an unprecedented DDoS attack against Dyn, a New Hampshire-based internet company, that disrupted access to websites including Twitter, CNN, The Guardian, Netflix, Reddit and others in the U.S. and Europe.

The Dyn assault happened after Mirai's source code was published, and the individuals identified Wednesday have not been charged in connection with that particularly DDoS attack.

Jha and his co-defendants -- White, 20, and Normal, 21 -- pleaded guilty on Dec. 8 to two separate criminal informations in Alaska District Court related to Mirai and another "clickfraud" botnet they admittedly used for financial gain, the Justice Department said Wednesday.

Jha separately pleaded guilty Wednesday in New Jersey District Court in connection with waging DDoS attacks that disrupted computer systems at Rutgers University last year.

All three defendants are free pending sentencing at a later date, Mr. Downing told reporters.

© 2018 Washington Times under contract with NewsEdge/Acquire Media. All rights reserved.

Image credit: iStock/Artist's concept.

Tell Us What You Think


Like Us on FacebookFollow Us on Twitter

Over the past decade, hospitals have been busy upgrading their systems from paper to electronic health records. Unfortunately, spending so much on EHR may have left insufficient funds for security.
The British government officially blamed Russia for waging the so-called NotPetya cyberattack that infected computers across Ukraine before spreading to systems in the U.S. and beyond.
© Copyright 2018 NewsFactor Network. All rights reserved. Member of Accuserve Ad Network.