Monday, March 24, 2025
HomeCyber Security NewsPhobos Ransomware Admin as Part of International Hacking Operation

Phobos Ransomware Admin as Part of International Hacking Operation

Published on

SIEM as a Service

Follow Us on Google News

The U.S. Department of Justice unsealed criminal charges today against Evgenii Ptitsyn, a 42-year-old Russian national accused of being a key figure in the notorious Phobos ransomware syndicate.

Ptitsyn was extradited from South Korea and made his initial appearance in the U.S. District Court for the District of Maryland on November 4.

Phobos ransomware has been linked to over 1,000 cyberattacks on public and private entities worldwide, resulting in more than $16 million in ransom payments from victims, according to prosecutors.

The ransomware specifically targeted critical sectors, including schools, hospitals, government agencies, and businesses, leaving a trail of encrypted data and financial devastation.

Maximizing Cybersecurity ROI: Expert Tips for SME & MSP Leaders – Attend Free Webinar

Deputy Attorney General Lisa Monaco emphasized the collaborative effort in Ptitsyn’s capture: “Thanks to the tireless work of law enforcement agencies across multiple countries, we’ve brought an alleged cybercriminal to justice.”

Monaco highlighted the importance of international partnerships in combating the growing ransomware threat.

Phobos Ransomware’s Global Reach

According to the report from the US Dep. of. Justice, Ptitsyn, operating under online pseudonyms such as “derxan” and “zimmermanx,” allegedly coordinated the sale and distribution of Phobos ransomware to criminal affiliates.

These affiliates would infiltrate victim networks, steal sensitive data, and encrypt files, demanding large ransom payments for decryption keys. Failure to pay often led to threats of public exposure of the stolen files.

Principal Deputy Assistant Attorney General Nicole M. Argentieri stressed the scale of the operation: “Ptitsyn and his co-conspirators extorted millions from victims globally. This indictment reflects our unwavering commitment to holding ransomware actors accountable.”

Ptitsyn faces a 13-count indictment, including charges of wire fraud conspiracy, computer fraud, and extortion.

If convicted, he could face up to 20 years in prison for each count of wire fraud and 10 years for each hacking-related charge. A federal judge will determine sentencing based on U.S. Sentencing Guidelines.

The FBI’s Baltimore Field Office has spearheaded the investigation, with international law enforcement agencies from South Korea, Europe, and beyond playing pivotal roles in Ptitsyn’s arrest and extradition.

This case marks a critical victory in the U.S. government’s ongoing fight against global cybercrime.

Are you from SOC/DFIR Teams? – Analyse Malware Files & Links with ANY.RUN -> Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Chinese ‘Web Shell Whisperer’ Leverages Shells and Tunnels to Establish Stealthy Persistence

A recent cyber espionage operation by a China-nexus threat actor, dubbed "Weaver Ant," has...

FCC Investigates Chinese Entities on US Government’s Prohibited List

The Federal Communications Commission (FCC) has initiated a new investigation into Chinese entities previously...

VanHelsingRaaS Emerges, Targeting Linux, BSD, ARM, and ESXi Systems

VanHelsingRaaS, a newly launched ransomware-as-a-service (RaaS) program, has quickly gained traction in the cybercrime...

WordPress Plugin Vulnerability Opens Door to SQL Injection Exploits

A critical vulnerability in the popular WordPress plugin GamiPress has been uncovered, leaving users...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Chinese ‘Web Shell Whisperer’ Leverages Shells and Tunnels to Establish Stealthy Persistence

A recent cyber espionage operation by a China-nexus threat actor, dubbed "Weaver Ant," has...

FCC Investigates Chinese Entities on US Government’s Prohibited List

The Federal Communications Commission (FCC) has initiated a new investigation into Chinese entities previously...

VanHelsingRaaS Emerges, Targeting Linux, BSD, ARM, and ESXi Systems

VanHelsingRaaS, a newly launched ransomware-as-a-service (RaaS) program, has quickly gained traction in the cybercrime...