Friday, April 25, 2025
HomeCyber CrimeDeadly Mirai and Qbot-based DDoS Botnet Creator Jailed for 13 months

Deadly Mirai and Qbot-based DDoS Botnet Creator Jailed for 13 months

Published on

SIEM as a Service

Follow Us on Google News

Kenneth Currin Schuchman, who is also known as Nexus Zeta from Vancouver, Canada, is the creator of deadly Mirai and Qbot-based botnet, has sentenced to 13 months in prison for hiring and promoting the Mirai and Qbot-based DDoS botnets utilized in DDoS attacks against targets from all over the world. 

Rather than Mirai, Kenneth Currin Schuchman also operated the Satori, Okiru, Masuta, and Tsunami/Fbot botnets, and these were published to the United States Probation and Pretrial Services on September 3, 2019.

He was sentenced on Thursday by the U.S. District Court of Alaska, where the Department of Justice stated that Schuchman is involved in criminal botnet projects since August 2017, and he controlled them with his two partners “Vamp” and “Drake” to execute the Satori botnet more complicated and powerful over time. 

- Advertisement - Google News

The Department of Justice asserted that Schuchman botnets are considered to have affected hundreds of thousands of devices along with malware. According to the DoJ’s press, Schuchman attached additional characteristics to the botnets over time, with the motive of making them “complex and effective.” 

But, the Doj also affirmed that the defendant used the botnets to expedite DDoS attacks, which occur when lots of computers were working in the community; he targeted the systems with the data to obstruct them from being able to access the internet.

The botnet Satori did extensive damages, and its repetitions would be unleashed in record-setting DDoS attacks. Well, this attack dominated more than 800,000 devices, which contain home routers, security cameras, webcams, also crushed ISPs, online gaming programs, and different web hosting companies as well.

According to the special agent in charge, Robert W. Britt of the FBI’s Anchorage Field Office affirmed that the Cyber-attacks profess serious harm to Alaskans, especially to those who belong to the remote communities. 

The officer also claimed that the increasing number of Internet-connected devices giving open challenges to their network security and also their daily lives. Consequently, the FBI Anchorage Field Office will continue to work tirelessly with their partners to grab those criminals who utilize these devices to cause damages globally.

In January, Schuchman joined Mirai and Satori botnet elements to increase the size of the bot army and concentrated on exploiting devices from Vietnam. While in March 2018, the group additionally enhanced the botnet, and renamed it as Tsunami/Fbot and outlining to target security camera devices, gaming servers, and High Silicon DVR systems. 

Moreover, the botnet was able to launch attacks surpassing 100 Gbps. The court declared in one of its statements that, in April 2018, the defense built a Qbot-derived DDoS botnet, straight fighting for customers with his former associate, Vamp.

After all this Schuchman was first interviewed in July 2018 by the FBI, well, he was operating with Vamp and Drake to enhance their active range of DDoS botnets.

But, this whole investigation was carried out by the FBI’s Anchorage Field Office with support from Akamai, Cloudflare, Google, Oracle, Palo Alto Unit 42, Unit 221B, and the University of Cambridge.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

7 Best Third-Party Risk Management Software in 2025

Whether you operate a small business or run a large enterprise, you rely on...

Chrome UAF Process Vulnerabilities Actively Exploited

Security researchers have revealed that two critical use-after-free (UAF) vulnerabilities in Google Chrome’s Browser...

Microsoft Defender XDR False Positive Leaked Massive 1,700+ Sensitive Documents to Publish

An alarming data leak involving Microsoft Defender XDR has exposed more than 1,700 sensitive...

‘SessionShark’ – A New Toolkit Bypasses Microsoft Office 365 MFA Security

Security researchers have uncovered a new and sophisticated threat to Microsoft Office 365 users:...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

New Rust-Based Botnet Hijacks Routers to Inject Remote Commands

A new malware named "RustoBot" has been discovered exploiting vulnerabilities in various router models...

FBI Alerts Public to Scammers Posing as IC3 Officials in Fraud Scheme

The Federal Bureau of Investigation (FBI) has issued a warning regarding an emerging scam...

XorDDoS Malware Upgrade Enables Creation of Advanced DDoS Botnets

Cisco Talos has uncovered significant advancements in the XorDDoS malware ecosystem, revealing a multi-layered...