Russian Nationwide Sentenced for Position in Kelihos Botnet
1 min read

Russian Nationwide Sentenced for Position in Kelihos Botnet

Russian Nationwide Sentenced for Position in Kelihos Botnet



Russian nationwide Oleg Koshkin has been sentenced to 48 months in jail for working a “crypting” service used to hide the Kelihos botnet from antivirus software program, enabling attackers to contaminate a whole bunch of 1000’s of machines, the Division of Justice reported this week.

Koshkin was convicted by a federal jury on June 15 on one rely of conspiracy to commit pc fraud and abuse, and one rely of pc fraud and abuse, court docket recordsdata state.

Courtroom paperwork and proof introduced at trial reveal Koshkin operated web sites that “promised to render malicious software program absolutely undetectable by almost each main supplier of antivirus software program,” DoJ officers wrote in a launch. Koshkin and co-conspirators claimed their providers could possibly be used for botnets, distant entry Trojans, keyloggers, credential stealers, cryptocurrency miners, and different threats.

Koshkin labored with Kelihos botnet operator Peter Levashov to create a system that may enable Levashov to crypt Kelihos a number of instances per day, the discharge states. Koshkin offered Levashov with a customized, high-volume crypting service that allowed the operator to distribute Kelihos by way of prison associates. Kelihos was used to ship spam, harvest account credentials, launch denial-of-service assaults, and distribute ransomware and different varieties of malware.

Kelihos relied on these crypting providers from 2014 till Levashov was arrested in April 2017. Within the final 4 months of its exercise, Kelihos contaminated roughly 200,000 computer systems all over the world.

Learn the full DoJ launch for extra particulars.

Sustain with the most recent cybersecurity threats, newly-discovered vulnerabilities, information breach data, and rising developments. Delivered day by day or weekly proper to your e mail inbox.

Leave a Reply

Your email address will not be published. Required fields are marked *