{"id":7286,"date":"2017-04-09T22:17:14","date_gmt":"2017-04-10T06:17:14","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/04\/09\/news-1077\/"},"modified":"2017-04-09T22:17:14","modified_gmt":"2017-04-10T06:17:14","slug":"news-1077","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/04\/09\/news-1077\/","title":{"rendered":"Alleged Spam King Pyotr Levashov Arrested"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Mon, 10 Apr 2017 04:17:09 +0000<\/strong><\/p>\n<p>Authorities in Spain have arrested a Russian computer programmer thought to be one of the world&#8217;s most notorious spam kingpins.<\/p>\n<p>Spanish police arrested <strong>Pyotr Levashov<\/strong>\u00a0under an international warrant executed in the\u00a0city of Barcelona, according to <a href=\"http:\/\/www.reuters.com\/article\/us-spain-russia-idUSKBN17B0O2\" target=\"_blank\">Reuters<\/a>. Russian state-run television station <strong>RT<\/strong>\u00a0(formerly <em>Russia Today<\/em>) reported that Levashov was arrested while vacationing in Spain with his family.<\/p>\n<div id=\"attachment_13548\" style=\"width: 590px\" class=\"wp-caption aligncenter\"><a class=\"lightbox\" href=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2012\/01\/SeveraSpamdot.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-13548 size-medium\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2012\/01\/SeveraSpamdot-600x414.png\" alt=\"Spamdot.biz moderator Severa listing prices to rent his Waledac spam botnet.\" width=\"580\" height=\"400\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2012\/01\/SeveraSpamdot-600x414.png 600w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2012\/01\/SeveraSpamdot-1024x706.png 1024w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2012\/01\/SeveraSpamdot.png 1249w\" sizes=\"auto, (max-width: 580px) 100vw, 580px\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">Spamdot.biz moderator Severa listing prices to rent his Waledac spam botnet.<\/p>\n<\/div>\n<p>According to numerous\u00a0<a href=\"https:\/\/krebsonsecurity.com\/?s=peter+severa&amp;x=0&amp;y=0\" target=\"_blank\">stories here at KrebsOnSecurity<\/a>, Levashov was better known as &#8220;<strong>Severa<\/strong>,&#8221; the hacker moniker used by a pivotal figure in many Russian-language cybercrime forums. Severa was the moderator for the spam subsection of multiple online communities, and in this role served as the virtual linchpin connecting virus writers with huge spam networks &#8212; including some that Severa allegedly\u00a0created and sold himself.<\/p>\n<p>Levashov\u00a0is currently <a href=\"https:\/\/www.spamhaus.org\/rokso\/spammer\/SPM893\/peter-severa-peter-levashov\" target=\"_blank\">listed as #7<\/a> in the the world&#8217;s <a href=\"https:\/\/www.spamhaus.org\/statistics\/spammers\/\" target=\"_blank\">Top 10 Worst Spammers<\/a> list maintained by anti-spam group <strong>Spamhaus<\/strong>. The U.S. Justice Department maintains that Severa was the Russian partner of\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Alan_Ralsky\" target=\"_blank\">Alan Ralsky<\/a>, a convicted American spammer\u00a0who specialized in &#8220;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Pump_and_dump\" target=\"_blank\">pump-and-dump<\/a>&#8221; spam schemes designed to artificially inflate the value of penny stocks.<\/p>\n<p>Levashov allegedly went by the aliases <strong>Peter Severa<\/strong>\u00a0and\u00a0<strong>Peter of the North <\/strong>(Pyotr is the Russian form of Peter). My reporting indicates that &#8212; in addition to spamming activities &#8212; Severa was responsible for running multiple\u00a0<a href=\"http:\/\/krebsonsecurity.com\/2011\/07\/spam-fake-av-like-ham-eggs\/\" target=\"_blank\">criminal operations that paid virus writers and spammers to install &#8220;fake antivirus&#8221; software<\/a>. So-called &#8220;fake AV&#8221; uses\u00a0malware and\/or programming tricks to bombard the victim with misleading alerts about security threats, hijacking the PC until its owner either pays for a license to the bogus security software or figures out how to remove the invasive program.<\/p>\n<div id=\"attachment_10861\" style=\"width: 567px\" class=\"wp-caption aligncenter\"><a class=\"lightbox\" href=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2011\/07\/sevdownload.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-10861 size-full\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2011\/07\/sevdownload.png\" alt=\"A screenshot of a fake antivirus or &quot;scareware&quot; affiliate program run by &quot;Severa,&quot; allegedly the cybercriminal alias of Pyotr Levashov, the Russian arrested in Spain last week.\" width=\"557\" height=\"550\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2011\/07\/sevdownload-300x296.png 300w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2011\/07\/sevdownload.png 557w\" sizes=\"auto, (max-width: 557px) 100vw, 557px\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">A screenshot of a fake antivirus or &#8220;scareware&#8221; affiliate program run by &#8220;Severa,&#8221; allegedly the cybercriminal alias of Pyotr Levashov.<\/p>\n<\/div>\n<p>There is <a href=\"https:\/\/krebsonsecurity.com\/2012\/01\/mr-waledac-the-peter-north-of-spamming\/\" target=\"_blank\">ample evidence<\/a> that Severa is the cybercriminal behind the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Waledac_botnet\" target=\"_blank\">Waledac<\/a> spam botnet, a spam engine that for several years infected between 70,000 and 90,000 computers and was capable of sending approximately 1.5 billion spam messages a day.<\/p>\n<p>In 2010, Microsoft launched a <a href=\"https:\/\/krebsonsecurity.com\/2010\/02\/microsoft-ambushes-waledac-botnet-shutters-whistleblower-site\/\" target=\"_blank\">combined technical and legal sneak attack<\/a> on the Waledac botnet, successfully dismantling it.\u00a0The company would later do the same <a href=\"https:\/\/krebsonsecurity.com\/2012\/03\/researchers-clobber-khelios-spam-botnet\/\" target=\"_blank\">to the Kelihos botnet<\/a>, a global spam machine which shared a great deal of computer code with Waledac.<\/p>\n<p>The connection between Waledac\/Kelihos and Severa is supported by data leaked in 2010 after hackers <a title=\"SpamIt, Glavmed Pharmacy Networks Exposed\" href=\"http:\/\/krebsonsecurity.com\/2011\/02\/spamit-glavmed-pharmacy-networks-exposed\/\" target=\"_blank\">broke into the servers of pharmacy spam affiliate program <strong>SpamIt<\/strong><\/a>.\u00a0According to the stolen SpamIt records, Severa &#8212; this time using the alias &#8220;<strong>Viktor Sergeevich Ivashov&#8221;<\/strong> &#8212; brought in revenues of $438,000 and earned commissions of $145,000 spamming rogue online pharmacy sites over a 3-year period.<\/p>\n<p>Severa also was a moderator of <strong>Spamdot.biz<\/strong> (pictured in the first screenshot above), a vetted, members-only forum\u00a0that at one time attracted almost daily visits from most of Russia&#8217;s top spammers. Leaked Spamdot forum posts for Severa indicate that <a href=\"https:\/\/krebsonsecurity.com\/2012\/12\/a-closer-look-at-two-bigtime-botmasters\/\" target=\"_blank\">he hails from Saint Petersburg<\/a>, Russia&#8217;s second-largest city.<span id=\"more-38941\"><\/span><\/p>\n<p>According to an exhaustive analysis published in my book &#8212; <em><a href=\"https:\/\/www.amazon.com\/Spam-Nation-Organized-Cybercrime-Epidemic-ebook\/dp\/B00L5QGBL0\/ref=dp_kinw_strp_1\" target=\"_blank\">Spam Nation: The Inside Story of Organized Cybercrime<\/a>\u00a0&#8212;\u00a0<\/em>Severa likely made more money renting Waledac and other custom spam botnets to other spammers than blasting out junk email on his own. For $200, vetted users could hire one of his botnets to send 1 million pieces of spam. Junk email campaigns touting auction and employment scams cost $300 per million, and phishing emails designed to separate unwary email users from their usernames and passwords could be blasted out through Severa\u2019s botnet for the bargain price of $500 per million.<\/p>\n<p>The above-referenced Reuters story on Levashov&#8217;s arrest cited reporting from Russian news outlet RT which associated Levashov with\u00a0hacking attacks linked to alleged interference in last year&#8217;s U.S. election. But subsequent updates from Reuters cast doubt on those claims.<\/p>\n<p>&#8220;A U.S. Department of Justice official said it was a criminal matter without an apparent national security connection,&#8221; Reuters added in an update to an earlier version of its story.<\/p>\n<p><em>The New York Times<\/em>\u00a0<a href=\"https:\/\/www.nytimes.com\/2017\/04\/09\/world\/europe\/peter-severa-levahsov-russia-arrest.html?_r=0\" target=\"_blank\">reports<\/a> that Russian news media <em>did not<\/em> say if Levashov was suspected of being involved in that activity. However, <em>The Times<\/em> piece observes that the Kelihos botnet does have a historic association with election meddling, noting the botnet was\u00a0used during the Russian election in 2012 to send political messages to email accounts on computers with Russian Internet addresses. According to <em>The Times<\/em>, those emails linked to fake news stories saying that <a href=\"https:\/\/en.wikipedia.org\/wiki\/Mikhail_Prokhorov\" target=\"_blank\">Mikhail D. Prokhorov<\/a>, a businessman who was running for president against <strong>Vladimir V. Putin<\/strong>, had come out as gay.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2017\/04\/alleged-spam-king-pyotr-levashov-arrested\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2012\/01\/SeveraSpamdot-600x414.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Mon, 10 Apr 2017 04:17:09 +0000<\/strong><\/p>\n<p>Authorities in Spain have arrested a Russian computer programmer thought to be one of the world&#8217;s most notorious spam kingpins.    Spanish police arrested Pyotr Levashov under an international warrant executed in the city of Barcelona, according to Reuters. Russian state-run television station RT (formerly Russia Today) reported that Levashov was arrested while vacationing in Spain with his family.    According to numerous stories here at KrebsOnSecurity, Levashov was better known as &#8220;Severa,&#8221; the hacker moniker used by a pivotal figure in many popular Russian-language cybercrime forums. Severa was the moderator for the spam subsection of multiple online communities, and in this role served as the virtual linchpin connecting virus writers with huge spam networks that Severa allegedly created and sold himself.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[11910,11911,11912,11913,11914,10689,10644,11915,11916,11917,11918,11919,11920,10659,11921,11277,11922,11923,179,11924],"class_list":["post-7286","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-alan-ralsky","tag-fake-antivirus","tag-fake-av","tag-kelihos-botnet","tag-mikhail-d-prokhorov","tag-new-york-times","tag-other","tag-peter-ivashov","tag-peter-levashov","tag-peter-severa","tag-pyotr-levashov","tag-reuters","tag-rokso","tag-spam-nation","tag-spamdot-biz","tag-spamhaus","tag-spamit","tag-viktor-sergeevich-ivashov","tag-vladimir-putin","tag-waledac"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7286","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7286"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7286\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7286"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7286"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}