
The botnets they spawned out of Mirai were known over time as Satori, Okiru, Masuta, and Tsunami/Fbot.
#QUEZ STRESSER REVIEW CODE#
They initially lifted code from the Mirai botnet to cook up their botnets, but over time, they added additional features, making the botnets ever more complicated and devastating. Vamp is actually Aaron Sterritt, a national from the UK, while Drake turns out to be Logan Shwydiuk, a Canadian national. The recently unsealed indictment reveals the names and locations of the two men who were sometimes his friends, sometimes his competitors and targets. Schuchman worked with two criminal colleagues: “Vamp”, also known as “Viktor,” and “Drake”. Schuchman was indicted in September 2018 on two counts of fraud and related activity in connection with a computer, but in the plea agreement he struck with prosecution, he pleaded guilty to just one count of fraud and related activity in connection with computers, in violation of the Computer Fraud & Abuse Act (CFAA). Satori did massive damage: it and its iterations would be unleashed in record-setting DDoS attacks that enslaved more than 800,000 devices – things like home routers, security cameras and webcams – and flattened ISPs, online gaming platforms and web hosting companies. In September 2019, he pleaded guilty to operating the Satori botnet, made up of IoT devices, and at least two other botnets to running a DDoS-for-hire service to cooking up one of the evolving line of botnets while he was indicted and under supervised release and to swatting one of his former chums, also while on supervised release. Kenneth Currin Schuchman, 22, from Vancouver, Wash., spent years developing distributed denial-of-service (DDoS) botnets. The coder who created the massive Satori botnet of enslaved devices and a handful of other botnets will be spending 13 months behind bars, the US Attorney’s Office of Alaska announced on Friday.
