Thursday, February 27, 2025
HomeCyber CrimeDeadly Mirai and Qbot-based DDoS Botnet Creator Jailed for 13 months

Deadly Mirai and Qbot-based DDoS Botnet Creator Jailed for 13 months

Published on

SIEM as a Service

Follow Us on Google News

Kenneth Currin Schuchman, who is also known as Nexus Zeta from Vancouver, Canada, is the creator of deadly Mirai and Qbot-based botnet, has sentenced to 13 months in prison for hiring and promoting the Mirai and Qbot-based DDoS botnets utilized in DDoS attacks against targets from all over the world. 

Rather than Mirai, Kenneth Currin Schuchman also operated the Satori, Okiru, Masuta, and Tsunami/Fbot botnets, and these were published to the United States Probation and Pretrial Services on September 3, 2019.

He was sentenced on Thursday by the U.S. District Court of Alaska, where the Department of Justice stated that Schuchman is involved in criminal botnet projects since August 2017, and he controlled them with his two partners “Vamp” and “Drake” to execute the Satori botnet more complicated and powerful over time. 

The Department of Justice asserted that Schuchman botnets are considered to have affected hundreds of thousands of devices along with malware. According to the DoJ’s press, Schuchman attached additional characteristics to the botnets over time, with the motive of making them “complex and effective.” 

But, the Doj also affirmed that the defendant used the botnets to expedite DDoS attacks, which occur when lots of computers were working in the community; he targeted the systems with the data to obstruct them from being able to access the internet.

The botnet Satori did extensive damages, and its repetitions would be unleashed in record-setting DDoS attacks. Well, this attack dominated more than 800,000 devices, which contain home routers, security cameras, webcams, also crushed ISPs, online gaming programs, and different web hosting companies as well.

According to the special agent in charge, Robert W. Britt of the FBI’s Anchorage Field Office affirmed that the Cyber-attacks profess serious harm to Alaskans, especially to those who belong to the remote communities. 

The officer also claimed that the increasing number of Internet-connected devices giving open challenges to their network security and also their daily lives. Consequently, the FBI Anchorage Field Office will continue to work tirelessly with their partners to grab those criminals who utilize these devices to cause damages globally.

In January, Schuchman joined Mirai and Satori botnet elements to increase the size of the bot army and concentrated on exploiting devices from Vietnam. While in March 2018, the group additionally enhanced the botnet, and renamed it as Tsunami/Fbot and outlining to target security camera devices, gaming servers, and High Silicon DVR systems. 

Moreover, the botnet was able to launch attacks surpassing 100 Gbps. The court declared in one of its statements that, in April 2018, the defense built a Qbot-derived DDoS botnet, straight fighting for customers with his former associate, Vamp.

After all this Schuchman was first interviewed in July 2018 by the FBI, well, he was operating with Vamp and Drake to enhance their active range of DDoS botnets.

But, this whole investigation was carried out by the FBI’s Anchorage Field Office with support from Akamai, Cloudflare, Google, Oracle, Palo Alto Unit 42, Unit 221B, and the University of Cambridge.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency...

Threat Actors Attack Job Seekers of Fortune 500 Companies to Steal Personal Details

In Q3 2024, Cofense Intelligence uncovered a targeted spear-phishing campaign aimed at employees working...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Zhong Stealer Malware Exploit Zendesk to Attack Fintech and Cryptocurrency

A newly identified malware, dubbed Zhong Stealer, has emerged as a significant threat to...

Russian Government Proposes Stricter Penalties to Tackle Cybercrime

The Russian government has unveiled sweeping legislative reforms aimed at curbing cybercrime, introducing stricter...

Palo Alto Firewall Flaw Exploited in RA World Ransomware Attacks

A recent ransomware attack leveraging a vulnerability in Palo Alto Networks' PAN-OS firewall software...