Hacker Behind Gozi Virus Ordered To Pay $7 Million

/ 3 years ago

Hacker Behind Gozi Virus Ordered To Pay $7 Million

Viruses and malicious software or malware can do lots of damage to a company or even a single person’s life. While hackers can put you at risk by hacking your car or even a nuclear power plant, it shouldn’t be underestimated just how much someone stealing your money can have on a life. Victims of the Gozi virus discovered this all the way back in 2007, but now in 2016, one of the creators of the virus has been ordered to pay back $6.9 million.

Nikita Kuzmin is from Russia and one of the three people responsible for the creation of the Gozi virus. The Gozi virus infiltrates people’s systems through a PDF file you download and suddenly you find your computers compromised and your accounts are being drained of their money.

Back in 2007, when the virus was successfully identified the authorities managed to locate a server containing 10,000 bank account details from a total of 5,200 computers. The Gozi virus was exclusive as Kuzmin offered people the ability to rent the virus for $500 a week, earning $250,000 through rentals. Since his arrest, Kuzmin has been helping authorities during his 37-month conviction from 2011 and will no doubt have to pay back the $7 million with money not obtained through his less than legal Gozi virus.

Topics: , , , , , , , ,

Support eTeknix.com

By supporting eTeknix, you help us grow. And continue to bring you the latest news, reviews, and competitions. Follow us on Facebook and Twitter to keep up with the latest technology. Share your favourite articles, chat with the team and more. Also check out eTeknix YouTube, where you'll find our latest video reviews, event coverage and features in 4K!
eTeknix FacebookeTeknix TwittereTeknix Instagram

Check out our Latest Video

Speak Your Mind

Tell us what you're thinking...
and oh, if you want a pic to show with your comment, go get a gravatar!

  • Be Social with eTeknix

  • Poll

    Who Is Your Favourite Motherboard Brand?

    View Results