Tuesday, May 13, 2025
HomeCyber CrimeAdmin of E-Root Marketplace was Arrested for RDP & SSH Passwords

Admin of E-Root Marketplace was Arrested for RDP & SSH Passwords

Published on

SIEM as a Service

Follow Us on Google News

Sandu Diaconu (31, Moldova) has been sentenced to extradition and removal from the United Kingdom for his role in administering the E-Root Marketplace.

This online platform was operational for several years and facilitated the sale of access to compromised computers globally. Diaconu, as the marketplace’s administrator, was found guilty of crimes associated with his actions.

According to the Department of Justice press release, Moldova has been charged with access device and computer fraud, wire fraud, money laundering, and access device fraud, together with a sealed co-defendant. 

- Advertisement - Google News

The E-Root Marketplace had its domain name seized by Moldova. Following his arrest by the United Kingdom, he was ordered by the Westminster Magistrates’ Court to be extradited to the United States to face pending charges.

Document
FREE Demo

Deploy Advanced AI-Powered Email Security Solution

Implementing AI-Powered Email security solutions “Trustifi” can secure your business from today’s most dangerous email threats, such as Email Tracking, Blocking, Modifying, Phishing, Account Take Over, Business Email Compromise, Malware & Ransomware

E-marketplace is an online platform that connects buyers and sellers, allowing third-party sellers to market and sell their products on the platform and invoice the customer for a purchase directly.

On E-Root, purchasers could look for stolen RDP and SSH credentials or other types of computer access by selecting relevant keywords and filtering results by price, location, ISP, and OS. 

In the investigation, more than 350,000 compromised computer credentials are listed for sale on the Marketplace. 

Ransomware attacks targeted many victims, and some of the stolen credentials advertised on the Marketplace were tied to tax fraud schemes based on stolen identities.

An indictment is simply a formal allegation that a person has violated one or more federal criminal laws, and every defendant is assumed innocent until and until proven guilty.

The incident in question led to a verdict of 20 years of imprisonment in a federal correctional facility in Moldova.

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Take advantage of the free trial to ensure 100% security.

Latest articles

Zoom Workplace Apps Flaws Allow Hackers to Gain Elevated Access

Zoom has released multiple security bulletins addressing seven newly discovered vulnerabilities in Zoom Workplace...

PoC Exploit Published for macOS Sandbox Escape Vulnerability (CVE-2025-31258)

Security researchers have disclosed a new macOS sandbox escape vulnerability tracked as CVE-2025-31258, accompanied...

Four Hackers Caught Exploiting Old Routers as Proxy Servers

U.S. authorities unsealed charges against four foreign nationals accused of operating a global cybercrime...

F5 BIG-IP Vulnerability Allows Remote Command Execution

Critical security vulnerability in F5 BIG-IP systems has been discovered that allows authenticated administrators...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Zoom Workplace Apps Flaws Allow Hackers to Gain Elevated Access

Zoom has released multiple security bulletins addressing seven newly discovered vulnerabilities in Zoom Workplace...

PoC Exploit Published for macOS Sandbox Escape Vulnerability (CVE-2025-31258)

Security researchers have disclosed a new macOS sandbox escape vulnerability tracked as CVE-2025-31258, accompanied...

Four Hackers Caught Exploiting Old Routers as Proxy Servers

U.S. authorities unsealed charges against four foreign nationals accused of operating a global cybercrime...