• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Ukrainian Gets Four Years for Brute Forcing Thousands of Credentials

You are here: Home / General Cyber Security News / Ukrainian Gets Four Years for Brute Forcing Thousands of Credentials
May 13, 2022

A Ukrainian guy has been handed a 4-calendar year jail phrase for stealing thousands of server logins and placing them up for sale on the dark web.

Glib Oleksandr Ivanov-Tolpintsev, 28, from Chernivtsi, was arrested in Oct 2020 by Polish law enforcement and subsequently extradited to the US, where he pleaded responsible in February this 12 months.

He’s explained to have managed a botnet designed to brute-power server logins en masse. Once cracked, these functioning qualifications have been then bought on a dark web market. Ivanov-Tolpintsev boasted that he could get hold of at least 2000 access qualifications in this way per week, according to the Department of Justice (DoJ).

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


He is mentioned to have listed hundreds of logins for sale on an unnamed marketplace from 2017 to 2019, acquiring around $82,000 from customers. Some of these credentials came from companies running in Florida, which is in which the circumstance was investigated by the FBI.

The marketplace itself outlined not only server usernames and passwords, but individually identifiable facts (PII), including dates of delivery and Social Security figures for US citizens.

Cyber-criminals used entry to these servers to launch ransomware attacks and dedicate tax fraud, in accordance to the DoJ.

The web-site reportedly offered in excess of 700,000 compromised servers for sale, like at minimum 150,000 in the US and 8000 in Florida, although victims spanned the globe.

Amongst the victims outlined by the DoJ have been area, state and federal governments, hospitals, unexpected emergency services, simply call facilities, metropolitan transit authorities, accounting and legislation companies, pension cash, and universities.

Regardless of finest observe assistance to switch to multi-factor authentication, passwords are however the most popular way for corporate consumers to accessibility IT property.

A security vendor revealed in a March 2021 report that it identified 1.5 billion breached login combos circulating online in the former 12 months, with 60% of credentials reused throughout multiple accounts.

This puts them at risk of credential stuffing and other brute force tactics, the place automatic botnets like Ivanov-Tolpintsev’s are established to do the job cracking open accounts.


Some sections of this short article are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News Government’s “Whole of Society” Cyber Strategy Takes Shape
Next Post: Tool that scans office software for vulnerabilities finds almost 100 in Word and Acrobat tool that scans office software for vulnerabilities finds almost 100»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Italy’s Privacy Watchdog Blocks ChatGPT Amid Privacy Concerns
  • Modular “AlienFox” Toolkit Used to Steal Cloud Service Credentials
  • New Azure Flaw “Super FabriXss” Enables Remote Code Execution Attacks
  • Winter Vivern APT Targets European Government Entities with Zimbra Vulnerability
  • MongoDB CISO: Don’t be afraid to simplify important issues for executives
  • Cyber Police of Ukraine Busted Phishing Gang Responsible for $4.33 Million Scam
  • Deep Dive Into 6 Key Steps to Accelerate Your Incident Response
  • Lazarus blamed for 3CX attack as byte-to-byte code match discovered
  • New Cylance Ransomware strain emerges, experts speculate about its notorious members
  • 3CX Supply Chain Attack — Here’s What We Know So Far

Copyright © TheCyberSecurity.News, All Rights Reserved.