Saturday, March 8, 2025
HomeRansomwareNotorious Ransomware Gang Arrested in Ukraine With The Support of EUROPOL

Notorious Ransomware Gang Arrested in Ukraine With The Support of EUROPOL

Published on

SIEM as a Service

Follow Us on Google News

A ransomware gang has been arrested recently in Ukraine, the gang has two members and both of them were arrested.

This was a joint international law enforcement operation that was conducted by several law enforcement agencies with the coordination of Europol.

The threat actors were arrested on September 28, in Kyiv, Ukraine’s capital. And after that, the officials investigated them and came to know that among two members, one of them was a 25-year-old deemed to be a significant member of a large ransomware operation.

Results of the action day

On completion of the investigation, the law officials have summoned the results of the action day, and here are the outputs mentioned below:-

  • 2 arrests and 7 property hunts
  • The capture of US$ 375 000 in cash
  • Seizure of two indulgence vehicles worth €217 000
  • Asset freezing of $1.3 million in cryptocurrencies

Law enforcement agencies involved

As we said above that this arrest was a joint operation, by many law enforcement body, so, that’s why we have mentioned the law enforcement agencies those who took part in this joint law enforcement operation:-

  • France: National Cybercrime Centre of the National Gendarmerie (C3N)
  • Ukraine: Cyber Police Department of the National Police of Ukraine
  • United States: Atlanta Field Office of the Federal Bureau of Investigation
  • Europol: European Cybercrime Centre (EC3)
  • INTERPOL: Cyber Fusion Centre

These threat actors were being suspected of committing a string of targeted attacks on April 2020, against very large industrial groups in Europe and North America.

Apart from this, it was being also noted that the two suspects are members of the REvil ransomware gang. However, the whole operation was being carried out in the framework of the European Multidisciplinary Platform Against Criminal Threats, and not only this but Europol has fully supported the investigation and tried to bring together all the affected countries to establish a joint strategy.

Also Read: Ransomware Attack Response and Mitigation Checklist

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

10 Best Penetration Testing Companies in 2025

Penetration testing companies play a vital role in strengthening the cybersecurity defenses of organizations...

Lumma Stealer Using Fake Google Meet & Windows Update Sites to Launch “Click Fix” Style Attack

Cybersecurity researchers continue to track sophisticated "Click Fix" style distribution campaigns that deliver the...

Fake BianLian Ransom Demands Sent via Physical Letters to U.S. Firms

In a novel and concerning development, multiple U.S. organizations have reported receiving suspicious physical...

Strela Stealer Malware Attack Microsoft Outlook Users for Credential Theft

The cybersecurity landscape has recently been impacted by the emergence of the Strela Stealer...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Fake BianLian Ransom Demands Sent via Physical Letters to U.S. Firms

In a novel and concerning development, multiple U.S. organizations have reported receiving suspicious physical...

Akira Ransomware Targets Windows Servers via RDP and Evades EDR with Webcam Trick

In a recent cybersecurity incident, the Akira ransomware group demonstrated its evolving tactics by...

North Korean Moonstone Sleet Uses Creative Tactics to Deploy Custom Ransomware

In a recent development, Microsoft has identified a new North Korean threat actor known...