Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Russian Hacker Admits using Ebury Botnet for Spam and Click Fraud

 

Maxim Senakh a hacker from Russia who's 41-yrs-old and belongs to Velikii Novgorod, of late, admitted to prominently participating in amassing Ebury a notorious botnet that aided in illegally generating dollars in millions. In doing so Senakh infringed upon the Computer Fraud and Abuse Act while carried out wire-fraud.

 

Ebury, name of a malicious program, garnered login details of OpenSSH while infecting their source -users' PCs and organizations' servers. With the details thus stolen, Senakh built the Ebury network-of-bots. The botnet comprised the 'slave' servers and PCs that obeyed the commands Senakh and his associates issued via one CnC (command-and-control) system.

 

It was 2011 when Ebury made its debut on the threat landscape. At the time, cyber-criminals employed it for hacking the Linux Foundation and Linux Kernel Organization, while solely attacked the UNIX kind of operating systems such as Solaris, FreeBSD, and Linux. Security researchers describe the malware an advanced backdoor since it utilized various methods for just not filching credentials but maintaining admission into hijacked servers as well.

 

Ebury network-of-bots was employed for producing and diverting traffic to support spam and click fraud campaigns that yielded millions of USD. The Ebury malware is actually one backdoor/rootkit Trojan created for filching SSH login details that existed within outbound and inbound SSH connections. When at the peak of its attack, ESET computed the malware contaminated 25,000 servers worldwide.

 

The Justice Department explains that the cyber-criminals added servers that were remotely controlled to their botnet and then executed spam and click fraud campaigns for monetizing the malicious network.

 

The infection harms pretty well so security experts recommend reinstallation of the entire server operating system. Senakh acknowledged being a conspirator during his prosecution inside a court in Minnesota where Patrick Schlitz United States District Judge presided. Zdne.com posted this, March 29, 2017.

 

Year 2015 was the period of Senakh's detention by Finnish officials who deported him to USA. After the detention, authorities in Russia asserted it as illegal because it went against internationally acknowledged forms of procedures.

 

Senakh will hear his sentence on 3rd August when he'll face a maximum of 10-yrs imprisonment.

» SPAMfighter News - 4/4/2017

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next