Saturday, March 15, 2025
HomeCyber CrimeAdmin of E-Root Marketplace was Arrested for RDP & SSH Passwords

Admin of E-Root Marketplace was Arrested for RDP & SSH Passwords

Published on

SIEM as a Service

Follow Us on Google News

Sandu Diaconu (31, Moldova) has been sentenced to extradition and removal from the United Kingdom for his role in administering the E-Root Marketplace.

This online platform was operational for several years and facilitated the sale of access to compromised computers globally. Diaconu, as the marketplace’s administrator, was found guilty of crimes associated with his actions.

According to the Department of Justice press release, Moldova has been charged with access device and computer fraud, wire fraud, money laundering, and access device fraud, together with a sealed co-defendant. 

The E-Root Marketplace had its domain name seized by Moldova. Following his arrest by the United Kingdom, he was ordered by the Westminster Magistrates’ Court to be extradited to the United States to face pending charges.

Document
FREE Demo

Deploy Advanced AI-Powered Email Security Solution

Implementing AI-Powered Email security solutions “Trustifi” can secure your business from today’s most dangerous email threats, such as Email Tracking, Blocking, Modifying, Phishing, Account Take Over, Business Email Compromise, Malware & Ransomware

E-marketplace is an online platform that connects buyers and sellers, allowing third-party sellers to market and sell their products on the platform and invoice the customer for a purchase directly.

On E-Root, purchasers could look for stolen RDP and SSH credentials or other types of computer access by selecting relevant keywords and filtering results by price, location, ISP, and OS. 

In the investigation, more than 350,000 compromised computer credentials are listed for sale on the Marketplace. 

Ransomware attacks targeted many victims, and some of the stolen credentials advertised on the Marketplace were tied to tax fraud schemes based on stolen identities.

An indictment is simply a formal allegation that a person has violated one or more federal criminal laws, and every defendant is assumed innocent until and until proven guilty.

The incident in question led to a verdict of 20 years of imprisonment in a federal correctional facility in Moldova.

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Take advantage of the free trial to ensure 100% security.

Latest articles

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting...

AWS SNS Exploited for Data Exfiltration and Phishing Attacks

Amazon Web Services' Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service...

Edimax Camera RCE Vulnerability Exploited to Spread Mirai Malware

A recent alert from the Akamai Security Intelligence and Response Team (SIRT) has highlighted...

Cisco Warns of Critical IOS XR Vulnerability Enabling DoS Attacks

Cisco has issued a security advisory warning of a vulnerability in its IOS XR...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting...

AWS SNS Exploited for Data Exfiltration and Phishing Attacks

Amazon Web Services' Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service...

Edimax Camera RCE Vulnerability Exploited to Spread Mirai Malware

A recent alert from the Akamai Security Intelligence and Response Team (SIRT) has highlighted...