Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks
嗯,用户让我帮忙总结一篇文章,控制在100字以内,而且不需要用“文章内容总结”之类的开头。我得先仔细看看这篇文章讲的是什么。 文章主要讲的是美国司法部起诉了一名俄罗斯人Ilya Angelov,他管理了一个僵尸网络,用于对美国公司发动勒索软件攻击。他被判两年监禁和10万美元的罚款。这个僵尸网络是通过分发带有恶意软件的垃圾邮件附件建立的,然后他和他的同伙出售对这些被感染电脑的访问权限,从而获利。 此外,文章还提到这个犯罪团伙TA551与多个勒索软件组织合作,比如BitPaymer和Conti,导致了超过1400万美元的赎金损失。美国检察官也强调了外国网络犯罪分子对美国企业和公民的威胁。 现在我需要把这些信息浓缩到100字以内。要包括主要人物、判决结果、僵尸网络的运作方式以及影响。可能还需要提到与其他勒索软件团伙的合作。 好,先列出关键点:俄罗斯人Ilya Angelov被判处两年监禁和罚款;管理僵尸网络用于勒索攻击;通过垃圾邮件传播恶意软件;与多个勒索软件团伙合作,导致大量损失;美国检察官评论。 现在把这些整合成一个连贯的句子,确保不超过100字。 </think> 一名俄罗斯男子因管理用于针对美国公司的勒索软件攻击的僵尸网络被判两年监禁并罚款10万美元。该男子及其团伙通过垃圾邮件分发恶意软件构建僵尸网络,并将其访问权限出售给其他犯罪集团用于勒索活动。该团伙与多个知名勒索软件组织合作,造成超过1400万美元的损失。 2026-3-25 11:52:0 Author: thehackernews.com(查看原文) 阅读量:2 收藏

The U.S. Department of Justice (DoJ) said a Russian national has been sentenced to two years in prison for managing a botnet that was used to launch ransomware attacks against U.S. companies.

Ilya Angelov, 40, of Tolyatti, Russia, was also fined $100,000. Angelov, who went by the online aliases "milan" and "okart," is said to have co-managed a Russia-based cybercriminal group known as TA551 (aka ATK236, G0127, Gold Cabin, Hive0106, Mario Kart, Monster Libra, and Shathak) between 2017 and 2021.

"Angelov's group built a network of compromised computers (a 'botnet') through distribution of malware-infected files attached to spam emails," the DoJ said. "Angelov and his co-manager then monetized this botnet by selling access to individual compromised computers ('bots')."

According to the sentencing memorandum, the threat group developed programs to distribute spam email and refined malware to bypass security tools. Angelov and his co-manager recruited members and oversaw the various activities. Chief among its tools was a backdoor through which malicious software could be uploaded to the victim's computers.

The main goal of the attacks was to resell the access to other criminal groups, who leveraged it for ransomware extortion schemes. Between August 2018 and December 2019, TA551 provided the BitPaymer ransomware group with access to its botnet, allowing the e-crime gang to infect 72 U.S. corporations. This resulted in more than $14.17 million in extortion payments.

The operators of the IcedID malware also paid Angelov's group over a million dollars to acquire access to the botnet in late 2019 or early 2020 and distribute ransomware, although the extent of the damage is currently not known. It's suspected that this partnership blossomed after the disruption of the BitPaymer group. The collaboration lasted until about August 2021, per the U.S. Federal Bureau of Investigation (FBI).

In November 2021, Cybereason revealed that the operators of the TrickBot trojan were teaming up with TA551 to distribute Conti Ransomware. That same month, France's Computer Emergency Response Team (CERT-FR) also disclosed that the Lockean ransomware gang was using distribution services offered by TA551 following the law enforcement takedown of the Emotet botnet at the start of 2021.

"Foreigner cybercriminals like this defendant target American citizens and corporations," U.S. Attorney Jerome F. Gorgon Jr. said in a statement. "Their methods grow in sophistication. But their motive remains the same – to rip-off and harm us."

The development comes a day after the DoJ announced that another Russian national, a 26-year-old Aleksei Olegovich Volkov (aka "chubaka.kor" and "nets") was sentenced to nearly 7 years in prison after pleading guilty to acting as an initial access broker (IAB) for Yanluowang ransomware attacks targeting eight companies in the U.S. between July 2021 and November 2022.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/russian-hacker-sentenced-to-2-years-for.html
如有侵权请联系:admin#unsafe.sh