Manager of botnet used in ransomware attacks gets 2 years in prison
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读整篇文章,抓住主要信息。 文章讲的是一个俄罗斯人Ilya Angelov因为管理钓鱼僵尸网络并参与BitPaymer勒索软件攻击而被判两年监禁。他和同伙通过大规模的钓鱼邮件传播恶意软件,每天发送70万封邮件,感染了3000台电脑。他们将访问权限卖给其他犯罪团伙,导致72家美国公司被攻击,损失超过1400万美元。 接下来,我需要把这些关键点浓缩成一句话,不超过100字。要确保包含主要人物、罪行、影响和结果。 可能的结构是:俄罗斯人因管理钓鱼网络参与勒索攻击被判两年,影响72家美国公司损失1400万美元。 这样既简洁又涵盖了所有重要信息。 </think> 俄罗斯人Ilya Angelov因管理钓鱼僵尸网络并参与BitPaymer勒索软件攻击被判两年监禁,影响72家美国公司损失1400万美元。 2026-3-25 09:0:22 Author: www.bleepingcomputer.com(查看原文) 阅读量:9 收藏

Hacker in prison

A Russian national has been sentenced to two years in prison after admitting that the phishing botnet he managed was used to launch BitPaymer ransomware attacks against 72 U.S. companies.

According to court documents, 40-year-old Ilya Angelov (who used the "milan" and "okart" online handles) decided to travel to the United States to plead guilty and face charges after the Russian invasion of Ukraine in February 2022 and after Vyacheslav Igorevich Penchukov, a member of the IcedID cybercrime gang and a criminal associate, was arrested in Switzerland.

Angelov was one of two leaders of a Russian cybercriminal operation tracked by the FBI gang as Mario Kart, and by threat analysts at various cybersecurity companies as TA551, Shathak, GOLD CABIN, Monster Libra, ATK236, and G0127.

Angelov and the other co-manager recruited members and oversaw the operation's malicious activities. The gang members filled a wide range of roles, including software coders responsible for developing malware, developing programs that distributed spam email, and customizing malware to evade security software.

"Through a massive spam email campaign—which could send 700,000 emails a day—the group distributed malware around the globe," prosecutors said. "If an unwitting recipient clicked on an attachment to one of the group's emails, concealed malware would infect their computer and add it to the Mario Kart botnet. At the height of the group's operation, approximately 3,000 computers per day could be infected."

The cybercrime gang used a massive botnet to distribute malware in large-scale phishing campaigns between 2017 and 2021, then sold access to infected devices to other cybercriminals, including affiliates involved in Ransomware-as-a-Service (RaaS) operations.

"This access was sold to other criminal groups, who typically engaged in ransomware extortion schemes: locking victims out of their computer networks and demanding extortion payments — commonly in cryptocurrency — to restore access," the Justice Department said on Tuesday.

"The FBI has identified over 70 U.S. corporations that were infected with ransomware by one organization linked to Angelov's group, resulting in over $14 million in extortion payments."

While these attacks took place between August 2018 and December 2019 and were all linked to the BitPaymer ransomware operation, the IcedID cybercrime gang also paid Angelov and his accomplices another million dollars between late 2019 and August 2021 for access to their bots, but the resulting damage is not yet known.

In the past, TA551 has been linked to various malware operators and some ransomware affiliates. TA551 operators also partnered with the notorious TrickBot gang (Wizard Spider) in phishing campaigns that deployed Conti ransomware on targets' compromised systems.

France's Computer Emergency Response Team (CERT) also flagged TA551 as a collaborator in the Lockean ransomware operation, helping its affiliates drop ProLock, Egregor, and DoppelPaymer ransomware payloads on devices infected with the Qbot/QakBot banking trojan.

26-year-old Russian national Aleksey Olegovich Volkov was also sentenced to nearly 7 years in prison this week after pleading guilty to acting as an initial access broker (IAB) for Yanluowang ransomware attacks.

tines

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.


文章来源: https://www.bleepingcomputer.com/news/security/russian-man-sentenced-for-operating-botnet-used-in-ransomware-attacks/
如有侵权请联系:admin#unsafe.sh