, , , , , , , , ,

This may be related to FBI investigation into the use of Bots for political purposes during the 2016 campaign.

From the USDOJ:
Tuesday, March 28, 2017
Russian Citizen Pleads Guilty for Involvement in Global Botnet Conspiracy

A Russian citizen pleaded guilty today for his participation in a criminal enterprise that installed and exploited malicious computer software (malware) on tens of thousands of computer servers throughout the world to generate millions of dollars in fraudulent payments.  

Acting Assistant Attorney General Kenneth A. Blanco of the Department of Justice’s Criminal Division, Acting U.S. Attorney Gregory G. Brooker of the District of Minnesota and Assistant Director Scott Smith of the FBI’s Cyber Division made the announcement.

Maxim Senakh, 41, of Velikii Novgorod, Russia, pleaded guilty today to conspiracy to violate the Computer Fraud and Abuse Act and to commit wire fraud before U.S. District Judge Patrick J. Schlitz of the District of Minnesota.  Sentencing is set for Aug. 3, 2017.  Senakh was indicted on Jan. 13, 2015, and was subsequently arrested by Finnish authorities, who extradited him to the United States. 

According to admissions made in connection with the plea agreement, the malware, which is known as Ebury, harvested log-on credentials from infected computer servers, allowing Senakh and his co-conspirators to create and operate a botnet comprising tens of thousands of infected servers throughout the world, including thousands in the United States.  Senakh and his co-conspirators used the Ebury botnet to generate and redirect internet traffic in furtherance of various click-fraud and spam e-mail schemes, which fraudulently generated millions of dollars in revenue.  As part of the plea, Senakh admitted that he supported the criminal enterprise by creating accounts with domain registrars which helped build the Ebury botnet infrastructure and personally profited from traffic generated by the Ebury botnet. 

The FBI Minneapolis Field Office is investigating the case.  Senior Counsels Aaron Cooper and Benjamin Fitzpatrick of the Criminal Division’s Computer Crime and Intellectual Property Section and Assistant U.S. Attorney Kevin Ueland of the District of Minnesota are prosecuting this case.  The Department of Justice extends its thanks to the government of Finland, the Bundeskriminalamt (BKA), CERT-Bund and the cyber security firm ESET.  The Criminal Division’s Office of International Affairs also provided substantial assistance.
Criminal Division
USAO – Minnesota
Cyber Crime

Discussion of use of Bots during the 2016 campaign: http://www.mcclatchydc.com/news/politics-government/white-house/article139695453.html

Remember that while the Russian Security Service (FSB) Members are believed behind the hacking of Yahoo accounts, one of the hackers stole credit and gift card information: “The defendants used unauthorized access to Yahoo’s systems to steal information from about at least 500 million Yahoo accounts and then used some of that stolen information to obtain unauthorized access to the contents of accounts at Yahoo, Google and other webmail providers, including accounts of Russian journalists, U.S. and Russian government officials and private-sector employees of financial, transportation and other companies. One of the defendants also exploited his access to Yahoo’s network for his personal financial gain, by searching Yahoo user communications for credit card and gift card account numbers, redirecting a subset of Yahoo search engine web traffic so he could make commissions and enabling the theft of the contacts of at least 30 million Yahoo accounts to facilitate a spam campaign.https://miningawareness.wordpress.com/2017/03/20/us-grand-jury-indicted-officers-of-the-russian-security-service-fsb-for-cybercrimes-trump-relaxed-sanctions-against-fsb-re-it-cyber-products-trump-advisor-flynn-paid-to-speak-by-russias-kasper/