Security News > 2020 > June > New Charges, Sentencing in Satori IoT Botnet Conspiracy
A defendant in the United States was sentenced today to drug treatment and 18 months community confinement for his admitted role in the botnet conspiracy.
Prosecutors say Sterritt, using the hacker aliases "Vamp" and "Viktor," was the brains behind the computer code that powered several potent and increasingly complex IoT botnet strains that became known by exotic names such as "Masuta," "Satori," "Okiru" and "Fbot.".
On October 21, 2016, an attack by a Mirai-based IoT botnet variant overwhelmed Dyn's infrastructure, causing outages at a number of top Internet destinations, including Twitter, Spotify, Reddit and others.
The government's sentencing memo also says Schuchman on multiple occasions absconded from pretrial supervision, and went right back to committing the botnet crimes for which he'd been arrested - even communicating with Sterritt about the details of the ongoing FBI investigation.
Chief Judge Burgess was the same magistrate who presided over the 2018 sentencing of the co-authors of Mirai, a highly disruptive IoT botnet strain whose source code was leaked online in 2016 and was built upon by the defendants in this case.
News URL
https://krebsonsecurity.com/2020/06/new-charges-sentencing-in-satori-iot-botnet-conspiracy/