As my colleague Cezarina explained in a previous article, a botnet
The network can be controlled remotely by online criminals to serve their interests and, at the same time, this allows the hackers to avoid detection or legal actions by law agencies.
The threat actor was apprehended at his Prykarpattia residence, where he was reportedly utilizing the botnet to launch ddos assaults or support other criminal behavior for his clients.
According to a statement provided by SSU, the hacker wasn’t only utilizing his botnet’s sheer force to bring down websites. Instead, he conducted reconnaissance and penetration testing on the target websites in order to find and exploit weaknesses.
Ukrainian SSU states the fact that hackers found customers on private forums and Telegram channels.
Apparently, he was paid through the electronic platform ‘Webmoney’, a payment platform that is subject to sanctions