Student Who Sold Cyber Attack Software Is Jailed

A Scottish university student from who made tens of thousands of pounds using  cyber attack software that brought down websites has been jailed for 21 months. 

Amar Tagore, a 21 year old, had earned almost £45,000 from his website, which offered buyers a malicious software designed to disrupt corporate and state-run sites.

Tagore supplied a tool used by hundreds of online customers to carry out Distributed Denial of Services (DDoS) attacks on systems which forces users to take their websites offline.

The third-year cyber security student was sentenced at Dumbarton Sheriff Court after pleading guilty to computer misuse charges and a breach of proceeds of crime legislation. Police were alerted to Tagore’s criminal conduct after the Department of Work and Pensions (DWP) suffered regular DDOS’ attacks at their job centre site in  Essex between 2022 and 2022.

Officers identified a suspect whose mobile phone was found to run a programme called “Myra” which was running two different attack “commands” towards the DWP computer system.

Detective Chief Inspector Andy Maclean, of Police Scotland’s Cybercrime Investigations Unit, said: “Tagore supplied a tool used by his customers to carry out Distributed Denial of Services (DDOS) attacks. These are often used to attack commercial systems, taking websites offline and causing widespread disruption”. Further investigations traced the “Myra” home page and its IP address to Tagore, with a search carried out of a house he shared with his parents in November 2022.

The website provided different Myra packages that could be purchased, and Tagore also provided technical support to those who bought the software. Analysis of his laptop revealed 73,347 search references that included the word “Myra”, with another 1,131 found on his mobile phone.

Investigators found that between January 2020 and November 2022, the 21-year-old earned £44,433 from the sales of malicious software.

The “normal” package claimed to be for beginners, while the VIP package would give users a “larger network increase and complex vector structures”. A VIP+ package stated that it had “access to all add-on packages for full accessibility to the network. Specialised with your attack suite to meet any desires.”

Sineidin Corrins, Deputy Procurator Fiscal for Specialist Casework at the Crown Office and Procurator Fiscal Service (COPFS), said: “Amar Tagore’s criminal conduct had the potential to cause serious disruption to government-affiliated and commercial websites all over the world... This investigation involved domestic and international partners and reflects the worldwide nature of cybercrime investigations which does not stop at traditional borders." 

Police Scotland   |   Cyber Security Review   |    STV   |   Yahoo   |    MSN   |    Rayo 

Image:  Ideogram

You Might Also Read: 

Telecoms - Beware Of The DDoS Threat Actor:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Semiconductor Manufacturing Companies Stocks Fall
Proposed British Digital Information & Smart Data Bill »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Chertoff Group

Chertoff Group

The Chertoff Group provide security advice and risk management services covering cyber security, insider threat, physical security and asset protection.

Paessler

Paessler

Paessler is a leading worldwide provider of network monitoring software.

Centripetal Networks

Centripetal Networks

Centripetal Networks was founded with one vision - to protect networks from advanced threats by simplifying intelligence-driven security.

Source Defense

Source Defense

Source Defense provides websites with the first ever prevention technology for attacks of third-party origin.

exceet Secure Solutions

exceet Secure Solutions

exceet Secure Solutions is your experienced specialist for Internet of Things (IoT), Heath Telematics, electronic signatures and timestamps and IT security.

Ritz

Ritz

Ritz is the largest holistic pure-play cyber security solutions provider in Myanmar.

Cytellix

Cytellix

Cytellix is an industry-standards-based, managed cybersecurity service provider, specializing in proactive behavioral analytics and situational awareness of an organization’s cyber posture.

BrandShelter

BrandShelter

BrandShelter specializes in providing online brand protection for companies and trademark owners.

MagiQ Technologies

MagiQ Technologies

MagiQ produced the world’s first commercial quantum cryptography product that delivered advanced, future-proof network security.

3B Data Security

3B Data Security

3B Data Security offer a range of Penetration Testing, Digital Forensics, Incident Response and Data Breach Management Services.

Security Risk Management (SRM)

Security Risk Management (SRM)

SRM provide a comprehensive security risk management service encompassing people, processes, technology, governance, compliance and risk management.

Zilla Security

Zilla Security

Zilla combines identity governance with cloud security to deliver comprehensive access visibility, reviews, lifecycle management, and policy-based security remediation.

PingSafe

PingSafe

PingSafe is creating the next-generation cloud security platform powered by attackers' intelligence, providing coverage for vulnerabilities that traditional security solutions would otherwise overlook

Zeus Cloud

Zeus Cloud

Zeus Cloud provide clients with world-class web hosting services to businesses both big and small.

Amplifier Security

Amplifier Security

Amplifier Security are on a mission to empower security teams to modernize their practice by connecting the dots between their security stack and their people.

Eclypses

Eclypses

Eclypses has a disrupting cyber technology, offering organizations an advanced data security solution called MicroToken Exchange (MTE).

Cynclair

Cynclair

Cybersecurity is a complex beast. And we're the beast-tamers. Our team thrives on deciphering the latest threats, building cutting-edge defenses, and making your digital world much safer.