Blaster author avoids restitution

Posted by   Virus Bulletin on   Mar 30, 2005

Microsoft allows Parson to work community service instead of paying $500,000

Microsoft has filed court documents requesting that Jeffrey Lee Parson, author of the B variant of the Blaster worm, serve 225 hours of community service in lieu of the $500,000 he owes the company in restitution.

In January 2005 Parson was sentenced to 37 months imprisonment as well as three years of supervised release and 100 hours of community service after he is released from prison. US District Judge Marsha Pechman said she was had decided on a relatively light sentence because of Parson's history of mental health problems and because his home life 'sounds grimmer than many prison camps [she'd] visited'.

Parson was also ordered to pay Microsoft $500,000 in restitution but - pending agreement from Judge Pechman - Parson will now work off his debt to Microsoft during his three years of supervised release, working 75 hours per year. Microsoft has stipulated that the community service is not to involve computers or the Internet, and is to benefit less fortunate members of the community.

Tim Cranton, senior attorney with the Internet Safety Enforcement group at Microsoft, said: 'We're pleased this prosecution has been fully resolved with a prison sentence and appropriate restitution. Mr. Parson's additional community service will have a stronger impact on him in serving his sentence.'

Posted on 30 March 2005 by Virus Bulletin

 Tags

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VBSpam tests to be executed under the AMTSO framework

VB is excited to announce that, starting from the Q3 test, all VBSpam tests of email security products will be executed under the AMTSO framework.

In memoriam: Prof. Ross Anderson

We were very sorry to learn of the passing of Professor Ross Anderson a few days ago.

In memoriam: Dr Alan Solomon

We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week.

New paper: Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

In a new paper, researchers Aditya K Sood and Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited in order to gather threat intelligence, and present a model of mobile AppInjects.

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.