A former Rutgers University student and two other men pleaded guilty to computer crimes related to the creation, sale and use of the Mirai botnet, a network of infected electronics equipment used to knock major Web sites offline in massive 2016 cyber attacks.
Paras Jha, 21, pleaded guilty in federal court on Friday to charges involving writing code that allowed him to infect and control devices with Mirai, the Justice Department said on Tuesday.
He also pleaded guilty on Wednesday in federal court in New Jersey to hacking that repeatedly shut down the Rutgers University computer system between 2014 and 2016, paralysing the school's networks for days at a time.
Two other individuals, Josiah White, 20, and Dalton Norman, 21, also pleaded guilty to charges related to the development and use of Mirai for criminal gain. Jha and Norman also pleaded guilty to a separate online advertising fraud scheme.
The Mirai botnet was used to infect hundreds of thousands of Internet-connected devices. including Web cams, which its creators then turned into bots that attacked Web sites and Internet infrastructure in "denial of service" assaults that knocked them offline.
Those attacks included one in October 2016 on an Internet infrastructure firm known as Dyn that disrupted access to dozens of Web sites across the US and Europe, including ones run by Twitter, PayPal Holdings and Spotify. Authorities said Jha and his accomplices did not carry out that specific attack, which took place after an individual believed to be Jha published Mirai's source code online.
US acting deputy assistant attorney general Richard Downing declined to comment when asked during a press call about the status of identifying those responsible for the Dyn attack.
Jha began to create the Mirai botnet in August 2016 to launch powerful denial of service attacks targeting business competitors and others against whom the attackers "held grudges", prosecutors said in court documents. He owned a service denial mitigation company called ProTraf Solutions, according to his LinkedIn page.
Jha and his co-conspirators also sought financial gain, renting out the botnet to other criminals. Jha attempted to destroy or conceal evidence of his crimes by erasing the virtual machine used to run Mirai and posting the code online to create "plausible deniability", prosecutors said.
In August 2016, White created the scanner that was part of the Mirai code, which helped the botnet identify devices that could be accessed and infected, charging documents said.
In September 2016, Norman and accomplices expanded Mirai, allowing it to infect more than 300 000 devices, prosecutors said. Court documents did not accuse Norman of creating Mirai, but said he helped monetise its use.
In a separate case unsealed on Tuesday, Jha and Norman were charged with leveraging another botnet for a different scheme to generate online ad revenue through fraudulent clicks, a practice known as click-fraud.
Jha admitted to earning about 200 bitcoin, which was valued at $180 000 on 29 January, as a result of the click-fraud, prosecutors said. The amount would be worth about $3.4 million today.
Robert Stahl, Jha's attorney, said his client had been released pending sentencing and has not been a student at New Jersey's Rutgers University since December 2016.
"Starting when he was just 19 years old, [Jha] made a series of mistakes with significant consequences that he only now fully appreciates," Stahl said in a statement. "He is extremely remorseful and accepts full responsibility for his actions."
Attorneys for White and Norman did not respond to requests for comment.
Jha's name surfaced in January, when the cyber Web site, Krebs On Security, reported he may have been behind the online persona Anna-Senpai, who claimed to be the author of the Mirai worm.
Anna-Senpai released the source code of the Mirai botnet online in September 2016, which gave other hackers the opportunity to use it. A month later, the massive assault on infrastructure firm Dyn took place, causing swaths of the Internet to be temporarily unavailable.
In court on Wednesday, Jha acknowledged his hacks caused Rutgers to lose $3.5 million to $9.5 million, acting US attorney William Fitzpatrick told reporters.
In a statement, Rutgers said no data was compromised and it had made "substantial improvements" to its technology infrastructure.
Share