where to find hackers for hire

0 26
Introduction: 1、Category Archives: DDoS-for-Hire 2、Israeli Hacker-For-Hire Sen...

Introduction:

1、Category Archives: DDoS-for-Hire

where to find hackers for hire

2、Israeli Hacker-For-Hire Sentenced To 80 Months In Prison For Involvement In Massive Spearphishing Campaign

Category Archives: DDoS-for-Hire

  Most people who operate DDoS-for-hire services attempt to hide their true identities and location. Proprietors of these so-called “booter” or “stresser” services — designed to knock websites and users offline — have long operated in a legally murky area of cybercrime law. But until recently, their biggest concern wasn’t avoiding capture or shutdown by the feds: It was minimizing harassment from unhappy customers or victims, and insulating themselves against incessant attacks from competing DDoS-for-hire services.

  And then there are booter store operators like John Dobbs, a 32-year-old computer science graduate student living in Honolulu, Hawaii. For at least a decade until late last year, Dobbs openly operated IPStresser[.]com, a popular and powerful attack-for-hire service that he registered with the state of Hawaii using his real name and address. Likewise, the domain was registered in Dobbs’s name and hometown in Pennsylvania.

  The only work experience Dobbs listed on his resume was as a freelance developer from 2013 to the present day. Dobbs’s resume doesn’t name his booter service, but in it he brags about maintaining websites with half a million page views daily, and “designing server deployments for performance, high-availability and security.”

Israeli Hacker-For-Hire Sentenced To 80 Months In Prison For Involvement In Massive Spearphishing Campaign

  Damian Williams, the United States Attorney for the Southern District of New York, announced that AVIRAM AZARI was sentenced today to 80 months in prison for computer intrusion, wire fraud, and aggravated identity theft in connection with his involvement in a massive computer-hacking campaign targeting companies and individuals in the U.S. and around the world. AZARI was arrested on these charges in September 2019 while traveling to the U. S. from abroad and has been detained since his arrest. U.S. District Judge John G. Koeltl imposed today’s sentence.

  U.S. Attorney Damian Williams said: “From his home in Israel, Aviram Azari played a major role in orchestrating and facilitating an international hacking-for-hire spearphishing campaign. The conspiracy targeted individuals and companies in the U.S. and abroad, resulting in the theft of data and netting Azari over $4.8 million in criminal proceeds. Today’s sentencing sends an unmistakable message about my Office’s firm commitment to prosecuting hackers, domestic and foreign alike.”

  According to the allegations contained in the Indictment to which AZARI pled guilty, public court filings, and statements made during court proceedings:

  From approximately November 2014 to September 2019, AZARI engaged in an extensive spearphishing campaign that targeted individuals and companies in the U. S. and around the globe. AZARI owned and operated an Israeli intelligence firm. Clients hired AZARI to manage “Projects” that were described as intelligence gathering efforts but were, in fact, hacking campaigns specifically targeting certain groups of victims, including climate change activists and individuals and financial firms that had been a critical part of the German payment processing company Wirecard A.G. AZARI paid different hacking groups, including a particular group located in India, to send spearphishing emails to victims of the various Projects. The hacking groups updated AZARI on their progress, including sending him lists that tracked their hacking efforts against specific victims. The hackers also sent AZARI reports, advising when they were successful in accessing victims’ accounts and stealing information.

  One of AZARI’s hacking Projects was focused on targeting individuals and organizations involved with climate change advocacy. Some of the hacked documents that were stolen from various of the victims’ online accounts were leaked to the press, resulting in articles relating to the New York and Massachusetts Attorneys Generals’ investigations into Exxon Mobil Corporation’s knowledge about climate change and potential misstatements made by Exxon regarding what it knew about the risks of climate change.

  Clients of AZARI’s Israeli private intelligence company paid AZARI more than approximately $4.8 million over a nearly five-year period for managing the intelligence gathering and spearphishing campaign. AZARI executed his crimes deliberately and over an extended period primarily for his own self-enrichment. Some of AZARI’s thousands of victims have described the devastating personal, financial, and reputational impact AZARI’s crimes had on them. Victims have described the persistent and relentless targeting of them and their associates, as well as the theft of their identities and personal data, as “psychological assault” that has caused them “anxiety, paranoia, depression, sleeplessness, and fear,” and the victims have expressed continued concerns for their personal safety.

  * * *

  AZARI, 52, of Kiryat Yam, Israel, pled guilty to one count of conspiracy to commit computer hacking, one count of wire fraud, and one count of aggravated identity theft. In addition to his prison term, AZARI was sentenced to three years of supervised release and was ordered to pay forfeiture of $4,844,968.

  Mr. Williams praised the outstanding investigative efforts of the Federal Bureau of Investigation.

你可能想看:
最后修改时间:
admin
上一篇 2025年03月01日 19:51
下一篇 2025年03月01日 20:14

评论已关闭