Russian botnet operator linked to major ransomware attacks sentenced in US
好的,我现在需要帮用户总结一篇英文文章的内容,控制在100字以内。首先,我得通读整篇文章,抓住主要信息。 文章讲的是一个俄罗斯人Ilya Angelov因为帮助运营一个僵尸网络而被判刑两年。这个僵尸网络被勒索软件团伙用来攻击美国公司。他属于一个叫做Mario Kart的网络犯罪集团,他们通过钓鱼邮件传播恶意软件,每天能感染大约3000台机器。这些被感染的机器被用来进行勒索软件攻击,比如BitPaymer,导致了超过1400万美元的赎金支付。 接下来,我需要把这些关键点浓缩到100字以内。重点包括:俄罗斯人、僵尸网络、勒索软件、攻击美国公司、判刑两年、罚款、犯罪集团 Mario Kart 的活动以及造成的损失。 可能的结构是:一个俄罗斯人因参与僵尸网络和勒索软件攻击被判两年,并罚款10万美元。该网络通过钓鱼邮件传播恶意软件,每天感染3000台设备,涉及多起勒索案件,造成重大损失。 检查一下字数是否在限制内,并确保没有使用“这篇文章”或“内容总结”这样的开头。这样应该能满足用户的需求。 </think> 一名俄罗斯男子因参与僵尸网络和勒索软件攻击被判两年监禁及10万美元罚款。该网络通过钓鱼邮件传播恶意软件,每天感染约3,000台设备,并涉及多起勒索案件,造成重大损失。 2026-3-25 15:1:0 Author: therecord.media(查看原文) 阅读量:4 收藏

A Russian national has been sentenced to two years in U.S. prison for helping operate a botnet used by ransomware gangs to attack American companies, authorities said Tuesday.

Ilya Angelov, 40, of Tolyatti, Russia, pleaded guilty to managing a botnet that other cybercriminals used to break into corporate systems and deploy ransomware. 

A U.S. district court sentenced Angelov to 24 months in prison and imposed a $100,000 fine. According to court records, he was one of the leaders of a Russia-based cybercrime group known as Mario Kart, also tracked as TA-551, Shathak, Gold Cabin and Monster Libra.

Members of the group distributed malware, launched large-scale spam campaigns and sold access to compromised machines to other cybercriminal operations. Mario Kart spread its malware primarily through phishing emails sent on a massive scale, sometimes reaching as many as 700,000 messages per day.

Victims who opened malicious attachments unknowingly infected their computers, adding them to the botnet. At its peak, the campaign was capable of compromising roughly 3,000 machines per day.

Angelov and a co-manager monetized the botnet by selling access to individual compromised computers, known as bots. This access was sold to other criminal groups that typically carried out ransomware extortion schemes.

One customer distributed the BitPaymer ransomware, which locked victims out of their computer systems and demanded payment, typically in cryptocurrency, to restore access. The FBI identified 72 U.S. computer networks infected with BitPaymer between August 2018 and December 2019, generating more than $14 million in ransom payments, according to court documents.

After disruptions to the BitPaymer operation, another criminal group linked to the IcedID malware paid Angelov’s group about $1 million for access to the botnet in late 2019 or early 2020, authorities said. The relationship later evolved into a partnership that lasted until around August 2021.

Angelov used the online aliases “milan” and “okart” while helping manage the group, which developed malware, operated spam distribution infrastructure and recruited members to expand the operation, prosecutors said.

In a separate case earlier this week, U.S. prosecutors announced a prison sentence for another Russian hacker linked to ransomware operations. Aleksei Volkov, who helped the Yanluowang ransomware gang breach U.S. companies, received an 81-month prison sentence for his role in attacks that caused millions of dollars in damage.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.


文章来源: https://therecord.media/russian-botnet-operator-sentenced-ransomware
如有侵权请联系:admin#unsafe.sh