Mirai Hackers' Sentence Includes No Jail TimeMirai Hackers' Sentence Includes No Jail Time
The trio behind Mirai sentenced to probation and public service in return for cooperation with law enforcement and researchers.
September 20, 2018
Three men charged with creating and managing the Mirai botnet have pleaded guilty to conspiracy to violate the Computer Fraud & Abuse Act and have been sentenced to a five-year period of probation and 2,500 hours of community service. They also have been ordered to pay restitution in the amount of $127,000 and have voluntarily abandoned significant amounts of cryptocurrency seized during the course of the investigation.
Paras Jha, 22, of Fanwood, N.J.; Josiah White, 21, of Washington, Pa.; and Dalton Norman, 22, of Metairie, La., were sentenced after cooperating extensively with the FBI. As part of their sentences, the three must continue to cooperate with the FBI, law enforcement, and researchers on cybercrime and cybersecurity matters. According to court documents, the defendants have provided assistance that substantially contributed to active complex cybercrime investigations and broader defensive efforts by both law enforcement and cybersecurity researchers.
Jha and Norman also pleaded guilty to the same charge in relation to the Clickfraud botnet. The defendants' involvement with Mirai ended in the fall of 2016, when Jha posted the source code for Mirai on a criminal forum. Noting the defendant's relative youth, Jeffery Peterson, special agent in charge of FBI's Anchorage Field Office, said, "This case demonstrates our commitment to hold criminals accountable while encouraging offenders to choose a different path to apply their skills."
Read more here.
Black Hat Europe returns to London Dec. 3-6, 2018, with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
The Burnout Breach: How employee burnout is emerging as the next frontier in cybersecurity
Selling Breaches: The Transfer of Enterprise Network Access on Criminal Forums
Building Immunity: The 2021 Healthcare and Pharmaceutical Industry Cyber Threat Landscape Report