{
	"id": "47dd44be-04c3-4b60-8a9e-9751ad9b1bff",
	"created_at": "2026-04-06T00:22:30.511134Z",
	"updated_at": "2026-04-10T13:12:23.436301Z",
	"deleted_at": null,
	"sha1_hash": "a9f5d3caa0d7c29ff8f02a4c6535776d7c4fdf40",
	"title": "Russia sentences REvil ransomware members to over 4 years in prison",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 866863,
	"plain_text": "Russia sentences REvil ransomware members to over 4 years in prison\r\nBy Lawrence Abrams\r\nPublished: 2024-10-25 · Archived: 2026-04-05 16:26:09 UTC\r\nRussia has sentenced four members of the REvil ransomware operation to over 4 years in prison for distributing malware\r\nand illegal circulation of means of payment.\r\nREvil ransomware (aka Sodin and Sodinokibi) was launched in April 2019 as a direct successor of the GandCrab operation.\r\nIn less than a year, the gang became the most prolific ransomware group, asking for some of the highest ransom payments at\r\nthe time and earning over $100 million in a year.\r\nhttps://www.bleepingcomputer.com/news/security/russia-sentences-revil-ransomware-members-to-over-4-years-in-prison/\r\nPage 1 of 4\n\n0:00\r\nhttps://www.bleepingcomputer.com/news/security/russia-sentences-revil-ransomware-members-to-over-4-years-in-prison/\r\nPage 2 of 4\n\nVisit Advertiser websiteGO TO PAGE\r\nHowever, in July 2021, when Revil hit over 1,500 businesses worldwide in a Kaseya supply chain attack, things took a turn\r\nfor the worse for the ransomware gang.\r\nIn response to the attack, President Biden asked President Putin to take action against cybercriminals residing in Russia;\r\notherwise, the U.S. would take action on its own.\r\nFeeling the pressure from international law enforcement, the REvil operation took a break and then resumed operations two\r\nmonths later. However, they did not know that US law enforcement and international partners had breached their servers\r\nbefore the breach. When the cybercriminals restored from backups, the criminals also restored machines controlled by law\r\nenforcement.\r\nAt the request of the US government, Russia's Federal Security Service (FSB) disrupted the REvil ransomware gang in\r\nJanuary 2022 after an international law enforcement operation identified and arrested members of ransomware operations,\r\nincluding the affiliate behind the Kaseya attack.\r\nThe FSB's action in 2022 led to the arrest of 14 members of the ransomware gang, raids at 25 addresses, and the seizure\r\nof $6.6. million.\r\n\"The basis for the search activities was the appeal of the competent US authorities, who reported on the leader of the\r\ncriminal community and his involvement in encroachments on the information resources of foreign high-tech companies by\r\nintroducing malicious software, encrypting information and extorting money for its decryption,\" Russia's Federal Security\r\nService said in a press statement at the time.\r\nAs reported by The Record, eight members were ultimately tried, with Artem Zayets, Alexey Malozemov, Daniil\r\nPuzyrevsky, and Ruslan Khansvyarov sentenced today and four others put into a separate proceeding.\r\nAccording to Russian media Kommersant, Zayets was sentenced today to 4.5 years, Malozemov to 5 years, Khansvyarov to\r\n5.5 years, and Puzyrevsky to 6 years.\r\nThe court found all four guilty of illegal circulation of means of payment, with Khansvyarov and Puzyrevsky also found\r\nguilty of distributing malware.\r\nThe other four members, Andrey Bessonov, Mikhail Golovachuk, Roman Muromsky, and Dmitry Korotayev, will now be\r\ntried in a separate proceeding for illegal access to computer information.\r\nhttps://www.bleepingcomputer.com/news/security/russia-sentences-revil-ransomware-members-to-over-4-years-in-prison/\r\nPage 3 of 4\n\nAutomated Pentesting Covers Only 1 of 6 Surfaces.\r\nAutomated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the\r\nother.\r\nThis whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic\r\nquestions for any tool evaluation.\r\nSource: https://www.bleepingcomputer.com/news/security/russia-sentences-revil-ransomware-members-to-over-4-years-in-prison/\r\nhttps://www.bleepingcomputer.com/news/security/russia-sentences-revil-ransomware-members-to-over-4-years-in-prison/\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.bleepingcomputer.com/news/security/russia-sentences-revil-ransomware-members-to-over-4-years-in-prison/"
	],
	"report_names": [
		"russia-sentences-revil-ransomware-members-to-over-4-years-in-prison"
	],
	"threat_actors": [],
	"ts_created_at": 1775434950,
	"ts_updated_at": 1775826743,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/a9f5d3caa0d7c29ff8f02a4c6535776d7c4fdf40.pdf",
		"text": "https://archive.orkl.eu/a9f5d3caa0d7c29ff8f02a4c6535776d7c4fdf40.txt",
		"img": "https://archive.orkl.eu/a9f5d3caa0d7c29ff8f02a4c6535776d7c4fdf40.jpg"
	}
}