Sunday January 26, 2020
Home Lead Story Canadian Accu...

Canadian Accused Of Helping Russian Intelligence Agents Sentenced To Prison For 5 Years

Karim Baratov, who pleaded guilty in November 2017 in San Francisco, was sentenced by U.S. District Judge Vince Chhabria, a spokesman for the U.S. Attorney's Office said.

0
//
business
The rise of New-Age baniya, courtesy digitally-savvy millennials (Tech Trend-Part I),Pixabay.

A Canadian accused of helping Russian intelligence agents break into email accounts as part of a massive 2014 data breach at Yahoo was sentenced Tuesday to five years in prison and ordered to pay a $250,000 fine.

Karim Baratov, who pleaded guilty in November 2017 in San Francisco, was sentenced by U.S. District Judge Vince Chhabria, a spokesman for the U.S. Attorney’s Office said.

Baratov, a Canadian citizen born in Kazakhstan, was arrested in Canada in March 2017 at the request of U.S. prosecutors. He later waived his right to fight a request for his extradition to the United States.

US
Karim Baratov, who pleaded guilty in November 2017 in San Francisco, was sentenced by U.S. District Judge Vince Chhabria, a spokesman for the U.S. Attorney’s Office said. Pixabay

Lawyers for Baratov in a court filing had urged a sentence of 45 months in prison, while prosecutors had sought 94 months.

“This case is about a young man, younger than most of the defendants in hacking cases throughout this country, who hacked emails, one at a time, for $100 a hack,” the defense lawyers wrote in a May 19 court filing.

Verizon Communications Inc., the largest U.S. wireless operator, acquired most of Yahoo’s assets in June 2017.

The U.S. Justice Department announced charges in March 2017 against Baratov and three others, including two officers in Russia’s Federal Security Service (FSB), for their roles in the 2014 hacking of 500 million Yahoo accounts. Baratov is the only one of the four who has been arrested. Yahoo in 2016 said cyberthieves might have stolen names, email addresses, telephone numbers, dates of birth and encrypted passwords.

Gmail targets

When FSB officers learned that a target had a non-Yahoo webmail account, including through information obtained from the Yahoo hack, they worked with Baratov, who was paid to break into at least 80 email accounts, prosecutors said, including numerous Alphabet Inc. Gmail accounts.

Read More: AI Outwits Doctors at Detecting Skin Cancer

Federal prosecutors said in a court filing “the targeted victims were of interest to Russian intelligence” and included “prominent leaders in the commercial industries and senior government officials (and their counselors) of Russia and countries bordering Russia.”

Prosecutors said FSB officers Dmitry Dokuchaev and Igor Sushchin directed and paid hackers to obtain information and used Alexsey Belan, who is among the FBI’s most-wanted cybercriminals, to breach Yahoo. (VOA)

 

Next Story

Hack Text Messages from Remote Location

0
Hack texts
With the recent development in the information technology field, it is possible to hack information from other mobile devices. Pixabay

With the recent development in the information science and technology field, it is possible to hack information from other mobile devices. Everyone is using a smartphone these days with Android, iOS or Windows operating systems which are not secured because many applications or software are designed to break the security and enter into the system. The mechanism to steal messages and other information is an interesting and enlightening task. Remote download of text messages of someone’s mobile through the internet is the main function of the hacking process. The basic requirement to initiate the process is to get the target’s phone number and a stable wi-fi connection.

Hack Text messages using the computer:

Many people are using a shared computer system and the browser saves much information which is sufficient for a hacker.

Steps for computer-based hacking:

Hack texts
The mechanism to hack messages and other information is an interesting and enlightening task. Pixabay
  1. When a user logged out his account from a system and another member is going to use it for the first time. 
  2. Invisible tracing can be activated on the system using computer-based software that can read the browser information and record all your activities for the hacker.
  3. In this way, novice users will never figure out that their account is under the provision of a hacker.

Hacking the information from jailbreak or rooted devices is quite easy, as all security locks are already broken. Most of the tracing monitors are compatible with both the operating systems.

Here is the list of features, which are provided by the application used to hack cell phone text messages:

  1. Location settings should be active of an intended source device, it is a real-time system to get the current place of the victim. With reading text messages, you can also have full access to the contact list.
  2. The application enabled you to check the call history and blocking and unblocking can be controlled by a hacker from a remote location.
Hack texts
Though iPhones are very secure, there is only one way to hack them by installing a new tracking or spying application on your device. Pixabay
  1. A control panel or dashboard is available for you to fetch all the device information as a file as well as call logs with details.
  2. With the hacking application, you have access to read the incoming and outgoing emails also to know about the schedule and gatherings. You can also check the bookmarks, browser history or websites that target is using.
  3. It not only covers the standard messaging application but also check other messengers such as Skype, Viber or WhatsApp. The application acts as remote control of another device and you will get the alerts if anything important is changed by the device owner.
  4. As a parent, you can block the websites if the children are using the internet all the time. And it prevents them to look inapt content which diverts them from studies. Doing these activities from a remote location can help not to breach the privacy of the teenagers.
  5. Employers can use this application to offer limited access to employees, which will help to increase the productivity of the business.

Also Read- Twitter India Unveils Special Tricolor India Gate Emoji To Celebrate 71st Republic Day

Though iPhones are very secure, there is only one way to hack them by installing a new tracking or spying application on your device.