Tuesday, November 19, 2024
HomeCyber Security NewsPhobos Ransomware Admin as Part of International Hacking Operation

Phobos Ransomware Admin as Part of International Hacking Operation

Published on

The U.S. Department of Justice unsealed criminal charges today against Evgenii Ptitsyn, a 42-year-old Russian national accused of being a key figure in the notorious Phobos ransomware syndicate.

Ptitsyn was extradited from South Korea and made his initial appearance in the U.S. District Court for the District of Maryland on November 4.

Phobos ransomware has been linked to over 1,000 cyberattacks on public and private entities worldwide, resulting in more than $16 million in ransom payments from victims, according to prosecutors.

- Advertisement - SIEM as a Service

The ransomware specifically targeted critical sectors, including schools, hospitals, government agencies, and businesses, leaving a trail of encrypted data and financial devastation.

Maximizing Cybersecurity ROI: Expert Tips for SME & MSP Leaders – Attend Free Webinar

Deputy Attorney General Lisa Monaco emphasized the collaborative effort in Ptitsyn’s capture: “Thanks to the tireless work of law enforcement agencies across multiple countries, we’ve brought an alleged cybercriminal to justice.”

Monaco highlighted the importance of international partnerships in combating the growing ransomware threat.

Phobos Ransomware’s Global Reach

According to the report from the US Dep. of. Justice, Ptitsyn, operating under online pseudonyms such as “derxan” and “zimmermanx,” allegedly coordinated the sale and distribution of Phobos ransomware to criminal affiliates.

These affiliates would infiltrate victim networks, steal sensitive data, and encrypt files, demanding large ransom payments for decryption keys. Failure to pay often led to threats of public exposure of the stolen files.

Principal Deputy Assistant Attorney General Nicole M. Argentieri stressed the scale of the operation: “Ptitsyn and his co-conspirators extorted millions from victims globally. This indictment reflects our unwavering commitment to holding ransomware actors accountable.”

Ptitsyn faces a 13-count indictment, including charges of wire fraud conspiracy, computer fraud, and extortion.

If convicted, he could face up to 20 years in prison for each count of wire fraud and 10 years for each hacking-related charge. A federal judge will determine sentencing based on U.S. Sentencing Guidelines.

The FBI’s Baltimore Field Office has spearheaded the investigation, with international law enforcement agencies from South Korea, Europe, and beyond playing pivotal roles in Ptitsyn’s arrest and extradition.

This case marks a critical victory in the U.S. government’s ongoing fight against global cybercrime.

Are you from SOC/DFIR Teams? – Analyse Malware Files & Links with ANY.RUN -> Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Maxar Space Data Leak, Threat Actors Gain Unauthorized Access to the System

Maxar Space Systems, a leader in space technology and Earth intelligence solutions, has recently...

Apache Kafka Vulnerability Let Attackers Escalate Privileges

A newly identified vulnerability tracked as CVE-2024-31141, has been discovered in Apache Kafka Clients that could allow...

Zohocorp ManageEngine ADAudit Plus SQL Injection Vulnerability

Zohocorp, the company behind ManageEngine, has released a security update addressing a critical SQL...

Citrix Virtual Apps & Desktops Zero-Day Vulnerability Exploited in the Wild

A critical new vulnerability has been discovered in Citrix’s Virtual Apps and Desktops solution,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Maxar Space Data Leak, Threat Actors Gain Unauthorized Access to the System

Maxar Space Systems, a leader in space technology and Earth intelligence solutions, has recently...

Apache Kafka Vulnerability Let Attackers Escalate Privileges

A newly identified vulnerability tracked as CVE-2024-31141, has been discovered in Apache Kafka Clients that could allow...

Zohocorp ManageEngine ADAudit Plus SQL Injection Vulnerability

Zohocorp, the company behind ManageEngine, has released a security update addressing a critical SQL...