Tuesday, November 12, 2024
HomeCyber Security NewsFour Evil Ransomware Operators Sentenced For Hacking Enterprises

Four Evil Ransomware Operators Sentenced For Hacking Enterprises

Published on

Malware protection

The St. Petersburg Garrison Military Court has sentenced four individuals involved in a notorious ransomware operation.

Artem Zayets, Aleksey Malozemov, Daniil Puzyrevsky, and Ruslan Khansvyarov have been found guilty of illegally circulating means of payment.

Puzyrevsky and Khansvyarov were also charged with using and distributing malicious software. This verdict marks a significant step in the global fight against cybercrime. 

- Advertisement - SIEM as a Service

Zayets and Malozemov received sentences of 4.5 and 5 years in a general regime penal colony, respectively.

Protecting Your Networks & Endpoints With UnderDefense MDR – Request Free Demo

Meanwhile, Khansvyarov and Puzyrevsky were sentenced to 5.5 and 6 years. These sentences reflect the severity of their crimes and the impact of their actions on international enterprises.

Four Evil Ransomware Arrested

According to Kommersant’s report, the investigation revealed that the convicted individuals were linked to the infamous hacking group REvil.

This group gained notoriety for its sophisticated ransomware attacks on high-tech companies worldwide.

The case came to light following a request from U.S. law enforcement agencies, which highlighted the individuals’ involvement in orchestrating cyberattacks on foreign information resources. 

Initially, 14 suspects were detained regarding the “REvil case.” However, only eight were brought to trial, with four others—Andrey Bessonov, Mikhail Golovachuk, Roman Muromsky, and Dmitry Korotayev—facing separate charges of illegally accessing computer information.

Their cases have been sent to the Prosecutor General’s Office for further consolidation. 

All defendants have been in custody since early 2022 and consistently denied wrongdoing. Their arrests in June 2021 followed a high-profile diplomatic exchange between Russia and the United States.

Just days before their capture, U.S. President Joe Biden had urged Russian President Vladimir Putin to take action against ransomware operators targeting Western entities. 

The sentencing of these individuals underscores the growing international pressure on Russia to address cybercriminal activities emanating from its territory.

The Western media often describes these hackers as pro-Russian cybercriminals, highlighting geopolitical tensions surrounding cybersecurity issues. 

This case serves as a stark reminder of the pervasive threat posed by ransomware groups like REvil.

Their ability to disrupt critical infrastructure and extort millions from companies has made them a top priority for law enforcement agencies worldwide. 

It also emphasizes the importance of international cooperation in combating cybercrime and protecting global digital infrastructure from malicious actors. 

The sentencing sends a clear message: those who engage in cybercrime will face justice, regardless of where they operate or whom they target.

Run private, Real-time Malware Analysis in both Windows & Linux VMs. Get a 14-day free trial with ANY.RUN!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS...

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays

In late October 2024, a coordinated IP spoofing attack targeted the Tor network, prompting...