US admitting that terrorists use chemical weapons vindicates Damascus — senatorRussian Politics & Diplomacy October 20, 11:33
Kiev police fail to make protesters remove tents from streetsWorld October 20, 11:31
Lawmaker says Catalonia crisis jeopardizes EU’s foundationsRussian Politics & Diplomacy October 20, 10:56
US confirms terrorists in Syria use chemical weapons — Russian Defense MinistryMilitary & Defense October 20, 9:02
Russia-India military drills Indra-2017 kick off in VladivostokMilitary & Defense October 20, 8:56
Russian Pacific Fleet warships call at Philippines’ ManilaMilitary & Defense October 20, 8:09
Putin says excessive trust in Europe is Russia’s key mistake in past yearsRussian Politics & Diplomacy October 19, 21:03
Russia determined to contribute to Ukraine's unification — PutinRussian Politics & Diplomacy October 19, 20:14
Situation surrounding North Korea highly dangerous, Putin saysRussian Politics & Diplomacy October 19, 19:59
WASHINGTON, August 3. /TASS/. A US court sentenced Russian citizen Maxim Senakh, extradited from Finland last year, to 46-month prison sentence on cybercrime charges, the US Department of Justice said on Thursday.
"Maxim Senakh, 41, of Veliky Novgorod, Russia, was sentenced to 46 months in prison and will be deported following his release from prison," the US Department of Justice said in a statement.
According to the statement, the Russian citizen was involved in "a criminal enterprise that installed and exploited malicious computer software (malware) on tens of thousands of computer servers throughout the world to generate millions of dollars in fraudulent payments."
On March 28, Senakh pleaded guilty to conspiracy to commit wire fraud and to violate the Computer Fraud and Abuse Act. He was arrested by Finnish authorities, who extradited him to the United States in February 2016.
According to the case, Senakh was involved in spreading the malware known as Ebury, which harvested log-on credentials from infected computer servers, allowing to create and operate a botnet comprising tens of thousands of infected servers throughout the world. The botnet was used "to generate and redirect internet traffic in furtherance of various click-fraud and spam e-mail schemes, which fraudulently generated millions of dollars in revenue."
"As part of his plea, Senakh admitted that he supported the criminal enterprise by creating accounts with domain registrars that helped develop the Ebury botnet infrastructure and personally profited from traffic generated by the Ebury botnet," the statement reads.