Saturday, July 13, 2024
EHA

Admin of E-Root Marketplace was Arrested for RDP & SSH Passwords

Sandu Diaconu (31, Moldova) has been sentenced to extradition and removal from the United Kingdom for his role in administering the E-Root Marketplace.

This online platform was operational for several years and facilitated the sale of access to compromised computers globally. Diaconu, as the marketplace’s administrator, was found guilty of crimes associated with his actions.

According to the Department of Justice press release, Moldova has been charged with access device and computer fraud, wire fraud, money laundering, and access device fraud, together with a sealed co-defendant. 

The E-Root Marketplace had its domain name seized by Moldova. Following his arrest by the United Kingdom, he was ordered by the Westminster Magistrates’ Court to be extradited to the United States to face pending charges.

Document
FREE Demo

Deploy Advanced AI-Powered Email Security Solution

Implementing AI-Powered Email security solutions “Trustifi” can secure your business from today’s most dangerous email threats, such as Email Tracking, Blocking, Modifying, Phishing, Account Take Over, Business Email Compromise, Malware & Ransomware

E-marketplace is an online platform that connects buyers and sellers, allowing third-party sellers to market and sell their products on the platform and invoice the customer for a purchase directly.

On E-Root, purchasers could look for stolen RDP and SSH credentials or other types of computer access by selecting relevant keywords and filtering results by price, location, ISP, and OS. 

In the investigation, more than 350,000 compromised computer credentials are listed for sale on the Marketplace. 

Ransomware attacks targeted many victims, and some of the stolen credentials advertised on the Marketplace were tied to tax fraud schemes based on stolen identities.

An indictment is simply a formal allegation that a person has violated one or more federal criminal laws, and every defendant is assumed innocent until and until proven guilty.

The incident in question led to a verdict of 20 years of imprisonment in a federal correctional facility in Moldova.

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Take advantage of the free trial to ensure 100% security.

Website

Latest articles

mSpy Data Breach: Millions of Customers’ Data Exposed

mSpy, a widely used phone spyware application, has suffered a significant data breach, exposing...

Advance Auto Parts Cyber Attack: Over 2 Million Users Data Exposed

RALEIGH, NC—Advance Stores Company, Incorporated, a prominent commercial entity in the automotive industry, has...

Hackers Using ClickFix Social Engineering Tactics to Deploy Malware

Cybersecurity researchers at McAfee Labs have uncovered a sophisticated new method of malware delivery,...

Coyote Banking Trojan Attacking Windows Users To Steal Login Details

Hackers use Banking Trojans to steal sensitive financial information. These Trojans can also intercept...

Hackers Created 700+ Fake Domains to Sell Olympic Games Tickets

As the world eagerly anticipates the Olympic Games Paris 2024, a cybersecurity threat has...

Japanese Space Agency Spotted zero-day via Microsoft 365 Services

The Japan Aerospace Exploration Agency (JAXA) has revealed details of a cybersecurity incident that...

Top 10 Active Directory Management Tools – 2024

Active Directory Management Tools are essential for IT administrators to manage and secure Active...

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles