Hacker Sentenced After Using Fake Ads to Spread Malware

Hacker Sentenced After Using Fake Ads to Spread Malware

FBI Cyber arrests hacker using fake advertisements.

A hacker who used fake advertisements placed on local newspaper websites to spread malware has been sentenced to 33 months in prison after sitting on the FBI Cyber's Most Wanted list for five years. 

Investigators found that associates of Peteris Sahurovs, including his wife, created a fake advertising company, known as RevolTech Marketing, and contacted a local news website to purchase advertising for their "client," a well-known American hotel chain. (According to the FBI, the hotel chain knew nothing about the scam.)

RevolTech created an advertisement for the hotels that redirected to what appeared to be a legitimate site. The hackers then swapped out the ad to one that would direct computers to a malware-infected website instead. The malware was installed whether or not the user clicked on the ad. Once infected, the only way users could remove the malware was to purchase a fake anti-virus software - a cost of $49.95. 

"You didn't have to interact with the website at all or click anything," FBI Special Agent Robert Cameron said in a news report. "There's nothing the user could have done to prevent it. The pop-ups would keep. coming to the point that you couldn't do anything on the computer. You'd have to click the link and buy the software."

Between the $50 (fake) anti-virus program and the hacker's fraudulent use of several of the victims' credit cards after the purchase, as well as the failure to pay for the website "ads", the overall scam cost victims an estimated $2 million. While the exact number of victims is not known, many believed to be in the Minneapolis area because of the nature of the website.

After sitting on the FBI Cyber's Most Wanted list, Sahurovs was arrested in Poland and extradited to the United States to face charges. In February, he pleaded guilty to conspiracy to commit wire fraud and just last month was sentenced to 33 months in prison. 



About the Author

Sydny Shepard is the Executive Editor of Campus Security & Life Safety.

Featured

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Motorola Solutions Named Official Safety Technology Supplier of the Ryder Cup through 2027

    Motorola Solutions has today been named the Official Safety Technology Supplier of the 2025 and 2027 Ryder Cup, professional golf’s renowned biennial team competition between the United States and Europe. Read Now

  • Evolving Cybersecurity Strategies

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.