Connect with us

Cyber Crime

How Rs 48 Lakh Malware Business Landed This Indian Origin Student in UK Prison

University student Amar Tagore, 21, jailed for creating malware targeting government websites, earning £45,000. His actions caused significant global disruptions.

Published

on

Cybersecurity Student Jailed for Selling Malware Targeting Government Websites
Cybersecurity Student Jailed for Selling Malware Targeting Government Websites

A 21-year-old university student, Amar Tagore, has been sentenced to 21 months in jail for creating and selling malware specifically designed to disrupt government and corporate websites. While residing with his parents in Alexandria, Tagore ran a clandestine operation, offering his malicious software to hundreds of online customers, empowering them to launch devastating distributed denial-of-service (DDoS) attacks.

DDoS Disruption for Hire:

DDoS attacks work by overwhelming a website with a massive influx of traffic, essentially flooding it with requests until it becomes inaccessible to legitimate users. Tagore’s malware, dubbed “Myra,” functioned as a weapon for hire, allowing anyone, from beginners to seasoned attackers, to unleash this disruptive power.

He offered various tiers of “Myra” packages, catering to different levels of expertise. The “normal” version provided a basic entry point, while the VIP and VIP+ tiers promised greater network access and more complex attack methods, potentially causing widespread disruption.

ALSO READ: Unpaid Traffic Challan? Don’t Click This App Link – It Could Bankrupt You!

Investigation Leads to Shocking Discovery:

The authorities first became aware of Tagore’s activities when the Department for Work and Pensions (DWP) reported a series of DDoS attacks targeting a Jobcentre site in Braintree, Essex, between May and August 2022.

Following a digital trail, investigators traced the attacks back to a program called “Myra” running on a mobile phone linked to Tagore. A subsequent search of his residence revealed a shocking scene – Tagore, logged into a “Myra VI” terminal displayed across two large monitors, actively managing attacks on behalf of another user. Further forensic analysis of his electronic devices unearthed a staggering truth: Tagore had amassed nearly £45,000 (Rs 48 Lakh approx.) through the sale of his malware between 2020 and 2022.

Guilty Plea and Ongoing Efforts:

Faced with overwhelming evidence, Tagore pleaded guilty to charges of computer misuse and breaching proceeds of crime legislation. He now faces the consequence of his actions, with authorities set to seize his ill-gotten gains.

ALSO READ: Fake Websites, Fake Profits: How This Cryptocurrency Scam Duped Over 100 Investors of Rs 5 Crore

Sineidin Corrins, deputy procurator fiscal for specialist casework at COPFS, Scotland’s prosecution service, highlighted the severity of Tagore’s crimes. She emphasized the potential disruption his actions could have caused to critical government and business websites, underlining the global reach of cybercrime investigations. COPFS remains committed to working tirelessly to combat cyber threats and safeguard communities from their damaging effects.

This case serves as a cautionary tale, demonstrating the potential for seemingly innocuous actions by individuals to morph into significant cyber threats. It underscores the ever-present need for robust cybersecurity measures and highlights the critical role of international collaboration in investigating and prosecuting cybercriminals, regardless of their location. The global nature of cybercrime necessitates a united front to combat this growing threat in today’s interconnected world.

Follow The420.in on

 TelegramFacebookTwitterLinkedInInstagram and YouTube

Continue Reading