{
	"id": "585695f7-78ce-4965-94c1-08a4b6a086f7",
	"created_at": "2026-04-06T00:15:31.350173Z",
	"updated_at": "2026-04-10T03:20:32.607469Z",
	"deleted_at": null,
	"sha1_hash": "ddea2b1b4c4db4849d7dd5bfa9161dbf20490c92",
	"title": "Russian Citizen Pleads Guilty for Involvement in Global Botnet Conspiracy",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 32090,
	"plain_text": "Russian Citizen Pleads Guilty for Involvement in Global Botnet\r\nConspiracy\r\nPublished: 2017-03-28 · Archived: 2026-04-05 21:29:58 UTC\r\nA Russian citizen pleaded guilty today for his participation in a criminal enterprise that installed and exploited\r\nmalicious computer software (malware) on tens of thousands of computer servers throughout the world to\r\ngenerate millions of dollars in fraudulent payments.  \r\nActing Assistant Attorney General Kenneth A. Blanco of the Department of Justice’s Criminal Division, Acting\r\nU.S. Attorney Gregory G. Brooker of the District of Minnesota and Assistant Director Scott Smith of the FBI’s\r\nCyber Division made the announcement.\r\nMaxim Senakh, 41, of Velikii Novgorod, Russia, pleaded guilty today to conspiracy to violate the Computer Fraud\r\nand Abuse Act and to commit wire fraud before U.S. District Judge Patrick J. Schlitz of the District of Minnesota.\r\n Sentencing is set for Aug. 3, 2017.  Senakh was indicted on Jan. 13, 2015, and was subsequently arrested by\r\nFinnish authorities, who extradited him to the United States. \r\nAccording to admissions made in connection with the plea agreement, the malware, which is known as Ebury,\r\nharvested log-on credentials from infected computer servers, allowing Senakh and his co-conspirators to create\r\nand operate a botnet comprising tens of thousands of infected servers throughout the world, including thousands in\r\nthe United States.  Senakh and his co-conspirators used the Ebury botnet to generate and redirect internet traffic in\r\nfurtherance of various click-fraud and spam e-mail schemes, which fraudulently generated millions of dollars in\r\nrevenue.  As part of the plea, Senakh admitted that he supported the criminal enterprise by creating accounts with\r\ndomain registrars which helped build the Ebury botnet infrastructure and personally profited from traffic\r\ngenerated by the Ebury botnet. \r\nThe FBI Minneapolis Field Office is investigating the case.  Senior Counsels Aaron Cooper and Benjamin\r\nFitzpatrick of the Criminal Division’s Computer Crime and Intellectual Property Section and Assistant U.S.\r\nAttorney Kevin Ueland of the District of Minnesota are prosecuting this case.  The Department of Justice extends\r\nits thanks to the government of Finland, the Bundeskriminalamt (BKA), CERT-Bund and the cyber security firm\r\nESET.  The Criminal Division’s Office of International Affairs also provided substantial assistance.\r\nSource: https://www.justice.gov/opa/pr/russian-citizen-pleads-guilty-involvement-global-botnet-conspiracy\r\nhttps://www.justice.gov/opa/pr/russian-citizen-pleads-guilty-involvement-global-botnet-conspiracy\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA",
		"Malpedia"
	],
	"references": [
		"https://www.justice.gov/opa/pr/russian-citizen-pleads-guilty-involvement-global-botnet-conspiracy"
	],
	"report_names": [
		"russian-citizen-pleads-guilty-involvement-global-botnet-conspiracy"
	],
	"threat_actors": [],
	"ts_created_at": 1775434531,
	"ts_updated_at": 1775791232,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/ddea2b1b4c4db4849d7dd5bfa9161dbf20490c92.pdf",
		"text": "https://archive.orkl.eu/ddea2b1b4c4db4849d7dd5bfa9161dbf20490c92.txt",
		"img": "https://archive.orkl.eu/ddea2b1b4c4db4849d7dd5bfa9161dbf20490c92.jpg"
	}
}