• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
20 year old russian lockbit ransomware affiliate arrested in arizona

20-Year-Old Russian LockBit Ransomware Affiliate Arrested in Arizona

You are here: Home / General Cyber Security News / 20-Year-Old Russian LockBit Ransomware Affiliate Arrested in Arizona
June 16, 2023

The U.S. Section of Justice (DoJ) on Thursday unveiled prices from a Russian countrywide for his alleged involvement in deploying LockBit ransomware to targets in the U.S., Asia, Europe, and Africa.

Ruslan Magomedovich Astamirov, 20, of Chechen Republic has been accused of perpetrating at minimum 5 attacks concerning August 2020 and March 2023. He was arrested in the point out of Arizona last month.

“Astamirov allegedly participated in a conspiracy with other associates of the LockBit ransomware marketing campaign to dedicate wire fraud and to deliberately problems secured computers and make ransom demands by the use and deployment of ransomware,” the DoJ said.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Astamirov, as part of his LockBit-linked routines, managed several email addresses, IP addresses, and other on-line accounts to deploy the ransomware and talk with the victims.

Cybersecurity

Regulation enforcement businesses claimed they had been in a position to trace a chunk of an unnamed victim’s ransom payment to a virtual forex deal with operated by Astamirov.

The defendant, if convicted, faces a highest penalty of 20 decades in prison on the initially demand and a highest penalty of five several years in jail on the 2nd cost.

Astamirov is the third specific to be prosecuted in the U.S. in link with LockBit after Mikhail Vasiliev, who is at this time awaiting extradition to the U.S., and Mikhail Pavlovich Matveev, who was indicted previous month for his participation in LockBit, Babuk, and Hive ransomware. Matveev remains at large.

In a current interview with The History, Matveev stated he was not shocked by the Federal Bureau of Investigation’s (FBI) final decision to incorporate his identify in the Cyber Most Required record and that the “news about me will be overlooked really before long.”

Matveev, who explained he is self-taught, also admitted to his role as an affiliate for the now-defunct Hive procedure, and professed his motivation to “consider IT in Russia to the future stage.”

Approaching WEBINAR🔐 Mastering API Security: Knowing Your Genuine Attack Surface area

Explore the untapped vulnerabilities in your API ecosystem and take proactive techniques towards ironclad security. Be a part of our insightful webinar!

Be a part of the Session.wn-button,.wn-label,.wn-label:afterdisplay:inline-block.look at_two_webinarmargin:20px 10px 30px 0background:#f9fbffcolor:#160755padding: 5%border:2px strong #d9deffborder-radius:10pxtext-align:leftbox-shadow:10px 10px #e2ebff-webkit-border-major-remaining-radius:25px-moz-border-radius-topleft:25px-webkit-border-base-suitable-radius:25px-moz-border-radius-bottomright:25px.wn-labelfont-dimension:13pxmargin:20px 0font-bodyweight:600letter-spacing:.6pxcolor:#596cec.wn-label:immediately afterwidth:50pxheight:6pxcontent:”border-top rated:2px strong #d9deffmargin: 8px.wn-titlefont-size:21pxpadding:10px 0font-weight:900textual content-align:leftline-top:33px.wn-descriptiontext-align:leftfont-dimension:15.6pxline-height:26pxmargin:5px !importantcolor:#4e6a8d.wn-buttonpadding:6px 12pxborder-radius:5pxbackground-coloration:#4469f5font-sizing:15pxcolor:#fff!importantborder:0line-top:inherittext-decoration:none!importantcursor:pointermargin:15px 20pxfloat:leftfont-fat:500letter-spacing:.2px

The DoJ statement also arrives a day right after cybersecurity authorities from Australia, Canada, France, Germany, New Zealand, the U.K., and the U.S. released a joint advisory warning of LockBit ransomware.

LockBit features underneath the ransomware-as-a-service (RaaS) model, in which the main team recruits affiliate marketers to have out the attacks towards company networks on their behalf in return for a slash of the ill-gotten proceeds.

The affiliate marketers are recognized to hire double extortion strategies by initially encrypting victim facts and then exfiltrating that information even though threatening to submit that stolen facts on leak internet sites in an try to pressurize the targets into paying out ransoms.

The team is approximated to have launched approximately 1,700 attacks because rising on the scene in late 2019, even though the specific number is believed to be increased since the dark web info leak web page only reveals the names and leaked information of victims who refuse to pay back ransoms.

Identified this short article fascinating? Observe us on Twitter  and LinkedIn to read far more unique articles we put up.


Some sections of this article are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Clop Starts MOVEit Extortion as New Bug is Discovered
Next Post: #InfosecurityEurope: How DORA Will Force Financial Firms to Adopt Cyber Resilience Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.