Cyber Security Student Arrested for Selling Malicious Software

During his time living with his parents, a cybersecurity student created malware that specifically targeted websites belonging to the government. Consequently, he was sent to prison.

Amar Tagore lived with his parents in Alexandria, Dunbartonshire, while he was a third-year student. He offered to sell spyware that may affect websites run by governments and companies.

Hundreds of internet users utilized the 21-year-old’s program to launch Distributed Denial of Service (DDoS) attacks, which contributed to his profits. In response to these attacks, users pulled their websites down from servers.

According to the Crown Office and Procurator Fiscal Service, he reportedly provided technical support to clients and developed and marketed cyber-attack software.

Tagore’s plea agreement included counts of computer abuse and breach of profits of crime legislation. Dumbarton Sheriff Court sentenced him to 21 months in jail.

According to the court record, between May 12, 2022, and August 18, 2022, the Jobcentre site in Braintree, Essex, which is part of the Department of Work and Pensions (DWP), was the target of several denial-of-service (DDoS) assaults. As a result, the police were alerted.

According to COPFS, law enforcement took the individual into custody when they found that their mobile device was infected with the dangerous program Myra. This program issued two distinct assault “commands” to the DWP computer system.

By tracking the IP address and webpage of the ‘Myra website, Tagore was ultimately discovered.

Website visitors may choose between a “normal” plan and a “VIP” one. The former promises a more significant network increase and complex vector structures to paying clients, while the latter promises access to all add-on packages for full network accessibility.

Officers found Tagore logged into a ‘Myra VI’ terminal window through two massive monitors in November 2022 when searching the residence where he lived with his parents. The court also determined that he was using “commands” that another person might use to launch two separate attacks.

The investigation revealed that Tagore’s laptop had 73,347 search references using the phrase “Myra,” and his mobile phone had 1,131.

An investigation of Tagore’s financial dealings found that he earned £44,433 from the sale of his malicious software from 2020 to 2022.

Tagore is currently the target of legislation that pertains to the seizure of illicitly obtained wealth.