Fear and loathing in the Mariposa aftermath

When Luis Corrons helped take down the Mariposa botnet he was a proud man, but he had no idea about what was to follow.

Netkairo admitted to not being a part of the creation process, but claimed he and his partner in crime had come up with 99 per cent of the idea.

"I don't know what you think, but coming up with an idea is not that hard for me," was Corrons' succinct response.

Another PandaLabs worker was with Corrons at the meeting and took the opportunity to ask Netkairo why the pair had involved themselves in the scheme.

The latter explained that it had started as a hobby but when the money started to roll in, it became more serious and they couldn't stop. Netkairo was shown the door.

Cyber crime silliness

Based on their behaviour thus far, it appeared that Netkairo and Ostiator were not the ingenious crooks they had tried to present themselves as.

Netkairo's next step involved setting up his own blog, attacking PandaLabs software and even promising to tell "the whole truth about Mariposa". The latter entry was subsequently deleted and Corrons suspects this was because Netkairo's lawyer told him to take down the post as it perhaps essentially offered a public confession.

Around a week later, the wannabe cyber criminal boasted on his blog about being involved another botnet scheme. This post was also deleted.

Then, in early May, a Twitter account appeared with the name Iuis_Corrons with a capital 'I' rather than an 'L' (the PandaLabs employee's real Twitter name is Luis_Corrons).

Creepily, the newly created account began following the same people as the real Corrons and even used the same profile picture. Following this, posts on the Iuis_Corrons Twitter contained links to adult material. Fortunately, the micro-blogging service was quick to shut the account down.

Netkairo professed his innocence on one of Corrons' blogs, but the PandaLabs expert had his suspicions that the deed was somehow connected to the pair.

Featured Resources

How to be an MSP: Seven steps to success

Building your business from the ground up

Download now

The smart buyer’s guide to flash

Find out whether flash storage is right for your business

Download now

How MSPs build outperforming sales teams

The definitive guide to sales

Download now

The business guide to ransomware

Everything you need to know to keep your company afloat

Download now

Recommended

Cyber attacks on manufacturing up 300% in a year
Security

Cyber attacks on manufacturing up 300% in a year

11 May 2021
Cisco to acquire threat intelligence provider Kenna Security
Acquisition

Cisco to acquire threat intelligence provider Kenna Security

14 May 2021
What is the Computer Misuse Act?
Policy & legislation

What is the Computer Misuse Act?

14 May 2021
Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021

Most Popular

KPMG offers staff 'four-day fortnight' in hybrid work plans
flexible working

KPMG offers staff 'four-day fortnight' in hybrid work plans

6 May 2021
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

29 Apr 2021
How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

30 Apr 2021