Moldovan national sentenced in E-Root cybercrime marketplace case

Siva Ramakrishnan
A 31-year-old Moldovan national was sentenced to 42 months in U.S. federal prison for operating a series of websites used to sell access to compromised computers worldwide, the U.S. Department of Justice said on Thursday

A 31-year-old Moldovan national was sentenced to 42 months in U.S. federal prison for operating a series of websites used to sell access to compromised computers worldwide, the U.S. Department of Justice said on Thursday.

According to court documents, Sandu Boris Diaconu was an administrator for the E-Root Marketplace, which listed more than 350,000 compromised credentials for sale, including those belonging to companies and individuals in the U.S. 

The victims included at least one local government agency in Tampa, Florida, prosecutors said. Authorities took down E-Root in 2020.

Diaconu was arrested while attempting to leave the U.K. in May 2021 and was extradited to the U.S. in October. He pleaded guilty in December.     

E-Root operated across a widely distributed network and took steps to hide the identities of its administrators, buyers, and sellers. Buyers could search for compromised computer credentials on E-Root, such as usernames and passwords, by desired criteria: price, geographic location, internet service provider and operating system.

The compromised credentials allowed criminals to access remote computers and steal private information or manipulate the contents of those computers. E-Root’s victims often were subject to ransomware attacks, and some of the stolen credentials listed on the marketplace were linked to stolen identity tax fraud schemes.

The E-Root Marketplace used Perfect Money, a legitimate online payment system, to help conceal buyers’ payments. The marketplace administrators offered an illicit cryptocurrency exchange service to convert bitcoin to Perfect Money and vice-versa. This exchange was also seized by U.S. law enforcement.

CybercrimeNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

IMF says February cyberattack involved compromise of 11 email accounts

Next Post

Pennsylvania’s Scranton School District dealing with ransomware attack

Related Posts

U.S. Seizes Domains Used by AI-Powered Russian Bot Farm for Disinformation

The U.S. Department of Justice (DoJ) said it seized two internet domains and searched nearly 1,000 social media accounts that Russian threat actors allegedly used to covertly spread pro-Kremlin disinformation in the country and abroad on a large scale. "The social media bot farm used elements of AI to create fictitious social media profiles — often purporting to belong to individuals in the
Avatar
Read More

Smash-and-Grab Extortion

The Problem The “2024 Attack Intelligence Report” from the staff at Rapid7 [1] is a well-researched, well-written report that is worthy of careful study. Some key takeaways are:  53% of the over 30 new vulnerabilities that were widely exploited in 2023 and at the start of 2024 were zero-days. More mass compromise events arose from zero-day vulnerabilities than from n-day vulnerabilities.
Avatar
Read More

CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers

A new ongoing malware campaign has been observed distributing three different stealers, such as CryptBot, LummaC2, and Rhadamanthys hosted on Content Delivery Network (CDN) cache domains since at least February 2024. Cisco Talos has attributed the activity with moderate confidence to a threat actor tracked as CoralRaider, a suspected Vietnamese-origin
Avatar
Read More