Monday, December 16, 2024
HomeCyber CrimeAdmin of E-Root Marketplace was Arrested for RDP & SSH Passwords

Admin of E-Root Marketplace was Arrested for RDP & SSH Passwords

Published on

SIEM as a Service

Sandu Diaconu (31, Moldova) has been sentenced to extradition and removal from the United Kingdom for his role in administering the E-Root Marketplace.

This online platform was operational for several years and facilitated the sale of access to compromised computers globally. Diaconu, as the marketplace’s administrator, was found guilty of crimes associated with his actions.

According to the Department of Justice press release, Moldova has been charged with access device and computer fraud, wire fraud, money laundering, and access device fraud, together with a sealed co-defendant. 

- Advertisement - SIEM as a Service

The E-Root Marketplace had its domain name seized by Moldova. Following his arrest by the United Kingdom, he was ordered by the Westminster Magistrates’ Court to be extradited to the United States to face pending charges.

Document
FREE Demo

Deploy Advanced AI-Powered Email Security Solution

Implementing AI-Powered Email security solutions “Trustifi” can secure your business from today’s most dangerous email threats, such as Email Tracking, Blocking, Modifying, Phishing, Account Take Over, Business Email Compromise, Malware & Ransomware

E-marketplace is an online platform that connects buyers and sellers, allowing third-party sellers to market and sell their products on the platform and invoice the customer for a purchase directly.

On E-Root, purchasers could look for stolen RDP and SSH credentials or other types of computer access by selecting relevant keywords and filtering results by price, location, ISP, and OS. 

In the investigation, more than 350,000 compromised computer credentials are listed for sale on the Marketplace. 

Ransomware attacks targeted many victims, and some of the stolen credentials advertised on the Marketplace were tied to tax fraud schemes based on stolen identities.

An indictment is simply a formal allegation that a person has violated one or more federal criminal laws, and every defendant is assumed innocent until and until proven guilty.

The incident in question led to a verdict of 20 years of imprisonment in a federal correctional facility in Moldova.

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Take advantage of the free trial to ensure 100% security.

Latest articles

Hackers Abuse Google Ads To Attacking Graphic Design Professionals

Researchers identified a threat actor leveraging Google Search ads to target graphic design professionals,...

Hackers Using New IoT/OT Malware IOCONTROL To Control IP Cameras, Routers, PLCs, HMIs And Firewalls

Recent cyberattacks targeting critical infrastructure, including fuel management systems and water treatment facilities in...

Hackers Exploiting Apache Struts2 Vulnerability to Upload Malicious Payloads

Hackers have begun exploiting a newly discovered vulnerability in Apache Struts2, a widely used...

Hackers Weaponizing Microsoft Teams to Gain Remote Access

Recent cybersecurity research has uncovered a concerning trend where hackers are exploiting Microsoft Teams...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Hackers Abuse Google Ads To Attacking Graphic Design Professionals

Researchers identified a threat actor leveraging Google Search ads to target graphic design professionals,...

Hackers Using New IoT/OT Malware IOCONTROL To Control IP Cameras, Routers, PLCs, HMIs And Firewalls

Recent cyberattacks targeting critical infrastructure, including fuel management systems and water treatment facilities in...

Hackers Exploiting Apache Struts2 Vulnerability to Upload Malicious Payloads

Hackers have begun exploiting a newly discovered vulnerability in Apache Struts2, a widely used...