Ukrainian hacker admits affiliate role in Nefilim ransomware gang
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。首先,我得仔细阅读文章,理解主要内容。 文章讲的是一个乌克兰人承认参与Nefilim勒索软件攻击,针对美国和其他国家的高收入企业。他叫Artem Stryzhak,35岁,在西班牙被捕后被引渡到美国。他承认了计算机欺诈共谋罪,面临最高10年的监禁。此外,还有提到他的同谋Volodymyr Tymoshchuk仍然在逃,并且有悬赏。 接下来,我需要把这些关键点浓缩到100字以内。重点包括:乌克兰人承认罪行、Nefilim勒索软件、目标是高收入企业、被捕和引渡、可能的刑期、同谋的情况。 然后,我要确保语言简洁明了,不使用任何开头词,直接描述内容。同时要注意字数限制,可能需要删减一些细节。 最后,检查一下是否涵盖了所有重要信息,并且表达清晰。 </think> 一名乌克兰男子承认参与Nefilim勒索软件攻击,针对美国及多国高收入企业。35岁的Artem Stryzhak于2024年在西班牙被捕,并于2025年被引渡至美国。他面临最高10年监禁指控。其同谋Volodymyr Tymoshchuk仍在逃,并被悬赏1100万美元。 2025-12-22 09:47:11 Author: www.bleepingcomputer.com(查看原文) 阅读量:1 收藏

Nefilim ransomware

A Ukrainian national pleaded guilty on Friday to conducting Nefilim ransomware attacks that targeted high-revenue businesses across the United States and other countries.

The defendant, 35-year-old Artem Aleksandrovych Stryzhak, was arrested in Spain in June 2024 and extradited to the U.S. on April 30, 2025.

Stryzhak has admitted to computer fraud conspiracy charges brought by U.S. prosecutors in connection with ransomware attacks targeting businesses in the United States, Norway, France, Switzerland, Germany, and the Netherlands.

Wiz

If found guilty, Stryzhak faces up to 10 years in prison, with sentencing scheduled for May 6, 2026.

According to court documents, Stryzhak allegedly obtained access to the Nefilim ransomware code in June 2021 in exchange for 20% of the ransom payments collected. The ransomware operation created customized malware for each victim along with decryption keys and ransom demands.

After joining the Nefilim operation, Stryzhak specifically targeted large corporations in the United States, Canada, and Australia with annual revenues exceeding $100 million, using custom-tailored malware for each victim along with decryption keys and ransom demands. However, one Nefilim administrator later encouraged Stryzhak to focus on companies generating more than $200 million annually.

Stryzhak and his accomplices researched potential targets using online platforms (including Zoominfo) to gather information about a company's revenue, size, and contact details.

To maximize pressure on victims, the group also threatened to leak data stolen during attacks on "Corporate Leaks" websites managed by the Nefilim admins unless ransom demands were met.

The U.S. State Department also offers up to $11 million for information leading to the arrest of Stryzhak's alleged co-conspirator, Ukrainian national Volodymyr Tymoshchuk, who remains at large.

Tymoshchuk is on the most-wanted lists of both the FBI and the European Union, and in September was charged by the U.S. Justice Department with his role as the administrator of the LockerGoga, MegaCortex, and Nefilim ransomware operations.

Tymoshchuk was allegedly involved in ransomware attacks that breached hundreds of companies worldwide, resulting in millions of dollars in damages between July 2020 and October 2021.

tines

Break down IAM silos like Bitpanda, KnowBe4, and PathAI

Broken IAM isn't just an IT problem - the impact ripples across your whole business.

This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.


文章来源: https://www.bleepingcomputer.com/news/security/ukrainian-hacker-admits-affiliate-role-in-nefilim-ransomware-gang/
如有侵权请联系:admin#unsafe.sh