• About
  • Disclaimer
  • Privacy Policy
  • Contact
Saturday, June 14, 2025
Cyber Defense GO
  • Login
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
Cyber Defense Go
No Result
View All Result
Home Cyber Security

US expenses two Russian males in reference to Phobos ransomware operation

Md Sazzad Hossain by Md Sazzad Hossain
0
US expenses two Russian males in reference to Phobos ransomware operation
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter

You might also like

Discord Invite Hyperlink Hijacking Delivers AsyncRAT and Skuld Stealer Concentrating on Crypto Wallets

Why Each Enterprise Wants a Regulatory & Compliance Lawyer—and the Proper IT Infrastructure to Assist Them

Detecting Ransomware on Community: How Community Site visitors Evaluation Helps


The US Division of Justice (DOJ) has unsealed legal expenses in opposition to two Russian nationals, alleged to have operated a cybercrime gang that used ransomware to focus on over 1000 American organisations.

Roman Berezhnoy and Egor Nikolaevich Glebov, 33 and 39 years previous respectively, are alleged to have extorted over US $16 million in ransom funds utilizing the Phobos ransomware.

Between Might 2019 and at the least October 2024, Roman Berezhnoy, Egor Nikolaevich Glebov, and others are alleged to have hit a variety of victims together with a kids’s hospital, well being care suppliers, and academic establishments with their cyber assaults and ransom calls for.

Berezhnoy, Glebov, and others are alleged to have run the Phobos ransomware affiliate operation variously referred to as names corresponding to “8Base” and “Affiliate 2803” – which left victims with their file encrypted, and a cryptocurrency ransom be paid to regain entry to their content material.

As is typical with many ransomware assaults, the legal scheme threatened that the sufferer’s stolen knowledge could be printed if a ransom was not paid.

Within the DOJ’s indictment in opposition to Berezhnoy and Glebov, it particulars how victims of the Phobos ransomware typically acquired a ransom demand of beneath US $100,000 – lower than the calls for made by different infamous ransomware teams.

Berezhnoy and Glebov have been arrested on Monday as a part of a coordinated operation which noticed multinational legislation enforcement businesses disrupt the operations of a cybercrime organisation, that additionally noticed the arrest of different suspects and the takedown of greater than 100 servers used within the Phobos scheme.

In February 2024, the FBI warned of the risk posed by Phobos, and shared particulars of the steps organisations may take to scale back the probabilities of falling foul of ransomware.

If convicted of the costs filed in opposition to them, Berezhnoy and Glebov face a possible sentence of a long time in jail.

One other Russian nationwide, Evgenii Ptitsyn, was just lately extradited to the US from South Korea to face expenses that he administered the sale, distribution, and operation of the Phobos ransomware.

Ptitsyn’s indictment underlined that it isn’t simply the biggest and wealthiest corporations who’re focused by ransomware operators – with one affiliate allegedly having efficiently extorted a ransom of simply US $2,300 out of a Maryland healthcare supplier.

Tags: chargesConnectionmenoperationPhobosransomwareRussian
Previous Post

The very best AI well being apps in 2025: Sensible instruments for higher wellbeing

Next Post

Winter Preparedness: Insights for Restoration Consultants

Md Sazzad Hossain

Md Sazzad Hossain

Related Posts

Discord Invite Hyperlink Hijacking Delivers AsyncRAT and Skuld Stealer Concentrating on Crypto Wallets
Cyber Security

Discord Invite Hyperlink Hijacking Delivers AsyncRAT and Skuld Stealer Concentrating on Crypto Wallets

by Md Sazzad Hossain
June 14, 2025
The Carruth Knowledge Breach: What Oregon Faculty Staff Must Know
Cyber Security

Why Each Enterprise Wants a Regulatory & Compliance Lawyer—and the Proper IT Infrastructure to Assist Them

by Md Sazzad Hossain
June 14, 2025
Detecting Ransomware on Community: How Community Site visitors Evaluation Helps
Cyber Security

Detecting Ransomware on Community: How Community Site visitors Evaluation Helps

by Md Sazzad Hossain
June 13, 2025
What’s Zero Belief Structure? A Newbie’s Information
Cyber Security

What’s Zero Belief Structure? A Newbie’s Information

by Md Sazzad Hossain
June 13, 2025
Palo Alto Networks Patches Sequence of Vulnerabilities
Cyber Security

Palo Alto Networks Patches Sequence of Vulnerabilities

by Md Sazzad Hossain
June 12, 2025
Next Post
Winter Preparedness: Insights for Restoration Consultants

Winter Preparedness: Insights for Restoration Consultants

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Meta’s New Cable Will Deliver Disruption to the Wholesale Telecom Market – IT Connection

Orange Wholesale to Allow Cellular Operators with 5G Core NaaS – IT Connection

March 12, 2025
Cyberkriminelle passen ihre Angriffsvektoren an

Cyberkriminelle passen ihre Angriffsvektoren an

April 30, 2025

Categories

  • Artificial Intelligence
  • Computer Networking
  • Cyber Security
  • Data Analysis
  • Disaster Restoration
  • Machine Learning

CyberDefenseGo

Welcome to CyberDefenseGo. We are a passionate team of technology enthusiasts, cybersecurity experts, and AI innovators dedicated to delivering high-quality, insightful content that helps individuals and organizations stay ahead of the ever-evolving digital landscape.

Recent

Addressing Vulnerabilities in Positioning, Navigation and Timing (PNT) Companies

Addressing Vulnerabilities in Positioning, Navigation and Timing (PNT) Companies

June 14, 2025
Discord Invite Hyperlink Hijacking Delivers AsyncRAT and Skuld Stealer Concentrating on Crypto Wallets

Discord Invite Hyperlink Hijacking Delivers AsyncRAT and Skuld Stealer Concentrating on Crypto Wallets

June 14, 2025

Search

No Result
View All Result

© 2025 CyberDefenseGo - All Rights Reserved

No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration

© 2025 CyberDefenseGo - All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In