Application security, Threat Management

Kentucky botmaster gets year in prison

Share

A botnet operator, rounded up this summer as part of the U.S. Justice Department's (DOJ) “Operation Bot Roast” sweep, has been sentenced to a year in prison.

Jason Michael Downey, 24, of Dry Ridge, Ky., was sentenced to 12 months in jail, three years of supervised release, and more than $21,000 in restitution by U.S. District Judge Nancy Edmunds last week.

Downey, who ran a botnet of up to 6,000 infected PCs, must also perform 150 hours of community service, according to the DOJ.

Arrested in June as part of the federal government's most aggressive move to date against bot herders, Downey caused more than $20,000 in damage through DoS attacks on victimized systems.

Downey controlled thousands of bot computers through the Rizon.net and Yotta-byte.net Internet Chat Relay networks, according to a DOJ news release.

U.S. Attorney Stephen Murphy said in a news release that the federal government has the training and know-how to track down cybercriminals.

“The so-called ‘botmasters' on the internet should realize that attacking and damaging other computer networks through a botnet can land you in prison,” he said. “We have the capacity to investigate and prosecute these high-tech crimes and will continue to do so.”

Alex Eckelberry, Sunbelt Software chief executive officer, declined to say if he thought the sentencing was appropriate, but said he was happy Downey is no longer operating botnets.

“I'm just glad they caught the guy,” he told SCMagazineUS.com today. “Let's hope he learns his lesson.”

An In-Depth Guide to Application Security

Get essential knowledge and practical strategies to fortify your applications.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds