Threat Intelligence

8/4/2017
09:20 AM
50%
50%

Russian Botnet Creator Receives 46-Month Prison Sentence

Federal court sentences the Ebury botnet creator and operator to prison for infecting tens of thousands of servers worldwide.

A federal court sentenced the Russian creator and operator of the Ebury botnet to a 46-month prison sentence and issued an order to have him deported after he's released from prison, the US Department of Justice (DOJ) announced.

Maxim Senakh, 41, pleaded guilty March 28 to conspiracy to commit wire fraud and violate the Computer Fraud and Abuse Act.

Senakh and his co-conspirators created and operated a botnet using the Ebury malware, which harvests log-on credentials from infected servers. Senakh used the botnet for various spam attacks and click-through fraud schemes, according to the DOJ.

The botnet generated millions of dollars in revenue from the tens of thousands of infected servers around the world.

Read more about Senakh here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Robert Lemos, Technology Journalist/Data Researcher,  4/19/2019
Tips for the Aftermath of a Cyberattack
Kelly Sheridan, Staff Editor, Dark Reading,  4/17/2019
Why We Need a 'Cleaner Internet'
Darren Anstee, Chief Technology Officer at Arbor Networks,  4/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-7213
PUBLISHED: 2019-04-24
SmarterTools SmarterMail 16.x before build 6985 allows directory traversal. An authenticated user could delete arbitrary files or could create files in new folders in arbitrary locations on the mail server. This could lead to command execution on the server for instance by putting files inside the w...
CVE-2019-7214
PUBLISHED: 2019-04-24
SmarterTools SmarterMail 16.x before build 6985 allows deserialization of untrusted data. An unauthenticated attacker could run commands on the server when port 17001 was remotely accessible. This port is not accessible remotely by default after applying the Build 6985 patch.
CVE-2019-9734
PUBLISHED: 2019-04-24
aquaverde Aquarius CMS through 4.3.5 writes POST and GET parameters (including passwords) to a log file because of incorrect if/else usage in the Log-File writer component.
CVE-2019-9928
PUBLISHED: 2019-04-24
GStreamer before 1.16.0 has a heap-based buffer overflow in the RTSP connection parser via a crafted response from a server, potentially allowing remote code execution.
CVE-2019-7211
PUBLISHED: 2019-04-24
SmarterTools SmarterMail 16.x before build 6995 has stored XSS. JavaScript code could be executed on the application by opening a malicious email or when viewing a malicious file attachment.