Netanyahu says every encounter with Putin benefits Israel’s securityWorld August 23, 19:15
Netanyahu determined to prevent Iran from strengthening positions in SyriaWorld August 23, 18:21
Russia's military might on display at Army-2017 forumMilitary & Defense August 23, 18:20
Russian defense minister examines weapons seized from terrorists in SyriaMilitary & Defense August 23, 18:12
Grand Russian art exhibition to be held in Vatican in 2018Society & Culture August 23, 17:47
Argentinian footballer Emiliano Rigoni signs contract with Russia’s Zenit FCSport August 23, 17:36
German chancellor suggests exerting diplomatic pressure on North KoreaWorld August 23, 17:01
Russian Defense Ministry orbits satellite for inspecting military space apparatusMilitary & Defense August 23, 16:59
Israel supports Russia’s participation in Sobibor memorial project in PolandWorld August 23, 16:35
WASHINGTON, August 3. /TASS/. A US court sentenced Russian citizen Maxim Senakh, extradited from Finland last year, to 46-month prison sentence on cybercrime charges, the US Department of Justice said on Thursday.
"Maxim Senakh, 41, of Veliky Novgorod, Russia, was sentenced to 46 months in prison and will be deported following his release from prison," the US Department of Justice said in a statement.
According to the statement, the Russian citizen was involved in "a criminal enterprise that installed and exploited malicious computer software (malware) on tens of thousands of computer servers throughout the world to generate millions of dollars in fraudulent payments."
On March 28, Senakh pleaded guilty to conspiracy to commit wire fraud and to violate the Computer Fraud and Abuse Act. He was arrested by Finnish authorities, who extradited him to the United States in February 2016.
According to the case, Senakh was involved in spreading the malware known as Ebury, which harvested log-on credentials from infected computer servers, allowing to create and operate a botnet comprising tens of thousands of infected servers throughout the world. The botnet was used "to generate and redirect internet traffic in furtherance of various click-fraud and spam e-mail schemes, which fraudulently generated millions of dollars in revenue."
"As part of his plea, Senakh admitted that he supported the criminal enterprise by creating accounts with domain registrars that helped develop the Ebury botnet infrastructure and personally profited from traffic generated by the Ebury botnet," the statement reads.