Attacks/Breaches

9/13/2018
01:00 PM
50%
50%

Kelihos Botnet Operator Pleads Guilty in Federal Court

The 38-year-old Russian national operated several botnets and infected thousands of systems with malware.

Peter Yuryevich Levashov, who operated the Kelihos botnet, pleaded guilty in U.S. District Court in Hartford, Conn., to charges related to criminal activities including harvesting login credentials, distributing bulk spam e-mails, and installing ransomware and other malicious software. From the late 1990s until his arrest in April 2017, the 38-year-old Levashov controlled and operated multiple botnets, including Storm, Waledac, and Kelihos.

According to court documents, Levashov distributed spam and other malware, such as banking Trojans and ransomware, and advertised the Kelihos botnet spam and malware services to others. As part of his criminal activity, Levashov, who also used the aliases “Petr Levashov,” “Peter Severa,” “Petr Severa,” and “Sergey Astakhov,” sold and leased malware software and services to other criminals, and engaged in buying, selling, and trading personal information harvested through the botnets and malware.

A native of St. Petersburg, Russia, Levashov was arrested in Barcelona on April 7, 2017. He remains in U.S. custody pending sentencing, which is scheduled for Sept. 6, 2019.

Read here for more.

 

Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-9962
PUBLISHED: 2019-03-24
XnView MP 0.93.1 on Windows allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to VCRUNTIME140!memcpy.
CVE-2019-9963
PUBLISHED: 2019-03-24
XnView MP 0.93.1 on Windows allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to ntdll!RtlFreeHeap.
CVE-2019-9964
PUBLISHED: 2019-03-24
XnView MP 0.93.1 on Windows allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to ntdll!RtlpNtMakeTemporaryKey.
CVE-2019-9965
PUBLISHED: 2019-03-24
XnView MP 0.93.1 on Windows allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to ntdll!RtlReAllocateHeap.
CVE-2019-9966
PUBLISHED: 2019-03-24
XnView Classic 2.48 on Windows allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to xnview+0x38536c.