Tuesday, February 11, 2025
HomeCyber AttackRussian IT Guy Jailed for DDoSing Government Websites

Russian IT Guy Jailed for DDoSing Government Websites

Published on

SIEM as a Service

Follow Us on Google News

According to reports from the FSB (Federal Security Service) Department’s Press Service in Rostov Region, Yevgeny Kotikov, an IT specialist, was sentenced to three years imprisonment.

FSB also ordered to pay a fine of 800 thousand rubles ($10,000) for his participation in a computer DDoS attack by Ukraine for blocking information resources in the Russian Federation.

The attack was organized by Ukraine and targeted the information systems belonging to the critical information infrastructure of the Russian Federation.

Kotikov was arrested in February 2022, during the start of the special military operation in Ukraine.

Kotikov was supporting the Kyiv regime, which decided to participate in blocking information resources of the Russian Ministry of Defense and the Russian Federation’s website for the president.

DDoS Attack On Government Websites

The FSB has also confiscated the personal computer used for the DDoS attacks.

This evidence was used to prove Kotikov guilty, resulting in a 3-year prison sentence to be served in a colony settlement, including the fine amount.

An independent security researcher, Oleg Shakirov, stated, “For instance, in February, a Russian national was sentenced under the same article for DDoS — but he got 3 years of suspended sentence, not a real sentence. The conflict with Ukraine was apparently an important factor that contributed to the severity of the sentence. The authorities would like to deter Russians from helping the Ukrainian cause, including in cyberspace.

The Russia-Ukraine war has developed a lot of heat among the countries, resulting in many criminal activities targeting each other. Peace must prevail in these nations as soon as possible.

Shut Down Phishing Attacks with Device Posture Security – Download Free E-Book

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Authorities Seize 8Base Ransomware Dark Web Site, Arrest Four Key Operators

Thai authorities arrested four European hackers in Phuket on February 10, 2025, for their...

12,000+ KerioControl Firewalls Exposed to 1-Click RCE Attack

Cybersecurity researchers caution that over 12,000 instances of GFI KerioControl firewalls remain unpatched and...

Apple iOS 0-day Vulnerability Exploited Wild in Extremely Sophisticated Attack

Apple has released emergency security updates to address a zero-day vulnerability, CVE-2025-24200, that has...

SHA256 Hash Calculation from Data Chunks

The SHA256 algorithm, a cryptographic hash function, is widely used for securing data integrity...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Authorities Seize 8Base Ransomware Dark Web Site, Arrest Four Key Operators

Thai authorities arrested four European hackers in Phuket on February 10, 2025, for their...

12,000+ KerioControl Firewalls Exposed to 1-Click RCE Attack

Cybersecurity researchers caution that over 12,000 instances of GFI KerioControl firewalls remain unpatched and...

Apple iOS 0-day Vulnerability Exploited Wild in Extremely Sophisticated Attack

Apple has released emergency security updates to address a zero-day vulnerability, CVE-2025-24200, that has...