Thursday, November 30, 2023

Hacker Receives 18-Month Prison for Running Dark Web Forum

In a momentous development in cybersecurity, Thomas Kennedy McCormick, alias “fubar,” a resident of Cambridge, Massachusetts, has been sentenced to 18 months imprisonment for masterminding a racketeering conspiracy within the infamous Darkode hacking forum.

The intricate web of cybercrime unraveled in the courtroom, revealing McCormick’s pivotal role in the development and dissemination of malicious software, resulting in substantial financial losses.

U.S. Attorney Matthew M. Graves and Acting Special Agent in Charge David Geist from the FBI’s Washington Field Office’s Criminal and Cyber Division jointly announced McCormick’s sentencing.

Along with the prison term, U.S. District Judge John D. Bates imposed 36 months of supervised release, emphasizing continued scrutiny over the convicted cyber offender.

Darkode’s Enigmatic Underworld

Court documents illuminated McCormick’s tenure as an administrator within Darkode, a clandestine organization operating within a password-protected cyber forum.

This illicit consortium served as a breeding ground for high-profile international hackers and cybercriminals, facilitating the development, trade, and exchange of hacking tools, knowledge, and nefarious ideas.

McCormick’s ascent from member to administrator marked his involvement in deploying malware worldwide, gaining illicit access and control over numerous devices.

McCormick’s malevolent activities extended beyond administrative duties, as he crafted and sold malicious software designed to pilfer users’ personal information, banking credentials, and credit card details.

The court revealed that his possession included stolen credit card data from nearly 30,000 individuals, along with an assortment of malware copies, reads the Attorney report.

McCormick’s guilty plea acknowledged his culpability in inflicting approximately $679,000 in financial losses through these cyber offenses.

Facing charges of racketeering conspiracy, conspiracy to commit wire and bank fraud, and aggravated identity theft, McCormick’s legal entanglement culminated in a guilty plea on March 3, 2020.

The sentencing was meted out as 12 months for racketeering conspiracy and an additional 6 months for aggravated identity theft, which encapsulates the legal ramifications of his cyber machinations.

This sentencing serves as the latest chapter in a sprawling investigation that led to the dismantling of Darkode in July 2015.

Twelve individuals faced charges in a coordinated effort involving law enforcement agencies from 20 nations, revealing the international reach and collaboration required to combat cybercrime.

The FBI spearheaded the investigation, receiving crucial assistance from Europol, the European CyberCrime Center (EC3), the United Kingdom’s National Crime Agency, and the Metropolitan Police Service (Scotland Yard).

Prosecutorial Symphony

The Fraud, Public Corruption, and Civil Rights Section of the U.S. Attorney’s Office for the District of Columbia collaborated with the Computer Crime and Intellectual Property Section, Violent Crime and Racketeering Section, and the Office of International Affairs of the Department of Justice’s Criminal Division.

Former Assistant U.S. Attorneys John P. Dominguez and Corbin A. Weiss, alongside current Assistant U.S. Attorney Peter V. Roman, orchestrated the legal proceedings.

Patch Manager Plus, the one-stop solution for automated updates of over 850 third-party applications: Try Free Trial.


Latest articles

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious...

US-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers

The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed...

CISA Warns Hackers Exploiting Wastewater Systems Logic Controllers

In a disconcerting turn of events, cyber threat actors have set their sights on...

Zyxel Command Injection Flaws Let Attackers Run OS Commands

Three Command injection vulnerabilities have been discovered in Zyxel NAS (Network Attached Storage) products,...

North Korean Hackers Attacking macOS Using Weaponized Documents

Hackers often use weaponized documents to exploit vulnerabilities in software, which enables the execution...

Most Popular Websites Still Allow Users To Have Weak Passwords

The latest analysis shows that tens of millions of people are creating weak passwords...

Chrome Zero-Day Vulnerability That Exploited In The Wild

Google has fixed the sixth Chrome zero-day bug that was exploited in the wild this...

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles