• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • December 16th, 2019
  • Home
  • About Us
  • Team
  • Advertise
  • Submit News
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Google+
    • Linkedin
    • Youtube
Home » Cyber Crime » No Prison for Student who Developed Spam Botnet to Pay College Fee

No Prison for Student who Developed Spam Botnet to Pay College Fee

November 3rd, 2017 Carolina Cyber Crime, Hacking News, Malware, Security 0 comments
No Prison for Student who Developed Spam Botnet to Pay College Fee
Share on FacebookShare on Twitter

Sean Tiernan, 29 from Santa Clara, California was given 24 months probation on October 30th for his involvement in developing a massive spam botnet that infected more than 77,000 devices to send spam and make money for his college fee.

The good news for Tiernan is that he is not facing any prison time for his crime since the bot was used to infect computers to serve as proxies to send spam messages and not to infect users with malware for other serious malicious purposes.

He was arrested in 2012 with CAN-SPAM violation by the Federal Bureau of Investigation (FBI) for developing, using and sending spams to users through the botnet where most of the infected devices were located in Western District of Pennsylvania.

He pleaded guilty in 2013. According to  US Department of Justice Press Release: “Once a computer was infected with the malware, the malware was programmed by Tiernan to automatically communicate and receive direction from servers over the Internet which were controlled by Tiernan, without knowledge of the infected computers’ owners.”

According to a report by Bleeping Computer, Tiernan confessed to his crime immediately and cooperated with the Bureau. 

After his arrest, Tiernan decided to pursue a career in the field of cybersecurity. It was due to his skills that a reputed cybersecurity firm hired him and he is now planning to go to the Stanford CyberSecurity Graduate Program for further education.

One has to acknowledge that Tiernan was lucky to skip jail time. Based on previous cases, the United States has been pretty strict on cybercriminals. The case of British hacker Lauri Love is a prime example of it who, if deported to the United States, could face 99 years in prison for hacking US government computers in the States.

The FBI also arrested WannaCry ransomware hero and British citizen Marcus Hutchins who was in the United States to attend a cybersecurity conference for creating a banking trojan targeting US citizens. Hutchins is currently out on bail.

[fullsquaread][/fullsquaread]

  • Tags
  • Cyber Crime
  • cyber security
  • FBI
  • hacking
  • Infosec
  • internet
  • Malware
  • Scam
  • security
  • Spam
  • Technology
  • USA
Facebook Twitter Google+ LinkedIn Pinterest
Previous article Mobile Pwn2Own: Hackers pwn iPhone, Huawei, Galaxy and Pixel Phone
Next article Flaw in Tor Browser Leads to Leaking of Your Real IP Address
Carolina

Carolina

Carolina works for HackRead as a technical writer. She is a Brazilian traveller who has been to almost every country around the world. She has a keen interest in technology, gadgets and social media.

Related Posts
How safe is business data stored in third-party supplier websites?

How safe is business data stored in third-party supplier websites?

Popular forms of cybercrime you should be aware of

Popular forms of cybercrime you should be aware of

Hundreds of counterfeit branded shoe stores hacked with web skimmer

Hundreds of counterfeit branded shoe stores hacked with web skimmer

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

LATEST POSTS
How safe is business data stored in third-party supplier websites?
Security

How safe is business data stored in third-party supplier websites?

14
Popular forms of cybercrime you should be aware of
Cyber Crime

Popular forms of cybercrime you should be aware of

514
70% of the entire US population is now on Facebook
Technology News

70% of the entire US population is now on Facebook

336
Hundreds of counterfeit branded shoe stores hacked with web skimmer
Cyber Crime

Hundreds of counterfeit branded shoe stores hacked with web skimmer

313

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us