A Russian national has pleaded guilty to multiple charges connected to his participation in different ransomware attacks targeting individuals and corporations. The defendant, Aleksei Olegovich Volkov, also known as “chubaka.kor, faces a maximum penalty of up to 53 years in prison if he is found guilty. According to court records, the Russian acted as the initial access broker for the Yanluowang ransomware group while being a resident in Russia from July 2021 to November 2022. Prosecutors accused Volkov and several unnamed co-conspirators of attacking seven United States businesses during that period, adding that at least two of the United States businesses paid a combined $1.5 million in ransoms. In the court records, prosecutors claimed that victims of the ransomware group included an engineering firm and a bank. They claimed that executives of these firms received harassing phone calls after their networks were hit with distributed denial of service (DDoS) attacks. The Yanluowang ransomware group was fingered for the operation, with the prosecutors noting that they stole data belonging to the firms and encrypted it to extort money. Russian national pleads guilty to multiple ransomware activities The court filings for Volkov’s case did not exactly name Cisco, but the enterprise networking and security vendor said it was impacted by an attack that it attributed to Yanluowang ransomware in May 2022. During its investigation, Cisco realized that the credentials of one of its employees were compromised after an attacker gained control of a personal Google account where credentials saved in the victim’s browser were being synchronized. Cisco claimed that the attacker then carried out a series of sophisticated voice phishing attacks under the guise of trusted organizations, attempting to convince the victim to accept multi-factor authentication push notifications initiated by the attacker. After succeeding, the attacker then got access to the VPN in the context of the targeted user. In its report, Cisco claimed that the attack had links to an initial access broker with ties to several ransomware groups, including UNC2447, Lapsus$, and Yanluowang. Prosecutors claimed that the Russian was charged with identifying targets, exploiting vulnerabilities in their systems, and sharing access with co-conspirators for a flat fee or a percentage of the ransom payments made by the victims. Some of the Russian’s victims were unable to function properly without access to some of the data stolen and had to partially halt their operations or shut down permanently in the wake of the attacks, causing hindrance to users. Volkov awaits sentencing amid agreement to pay $9.2 million Prosecutors also claimed the group got $24 million from all seven ransomware victims. The FBI also traced cryptocurrency transactions related to the payments to accounts that were maintained by the Russian and another co-conspirator, CC-1, who they claimed resided in Indianapolis at the time. The FBI was able to confirm Volkov’s identity using blockchain analysis. They were also able to uncover multiple accounts used for communication within the group. In their communication, the group talked about ransomware attacks, payments, and splitting proceeds from their criminal activities. In the unsealed indictment, the Russian was arrested in January 2024 in Rome, where he had been living, and was later extradited to the United States and remains in custody in Indiana. Volkov previously filed an intention to plead guilty in April and agreed to have his case moved to Indiana. The Russian pleaded guilty to six charges, including unlawful transfer of a means of identification, trafficking in access information, access device fraud, conspiracy to commit computer fraud, aggravated identity theft, and conspiracy to commit money laundering. The plea agreement will also see Volkov pay a combined restitution of about $9.2 million to the seven victims. The smartest crypto minds already read our newsletter. Want in? Join them.A Russian national has pleaded guilty to multiple charges connected to his participation in different ransomware attacks targeting individuals and corporations. The defendant, Aleksei Olegovich Volkov, also known as “chubaka.kor, faces a maximum penalty of up to 53 years in prison if he is found guilty. According to court records, the Russian acted as the initial access broker for the Yanluowang ransomware group while being a resident in Russia from July 2021 to November 2022. Prosecutors accused Volkov and several unnamed co-conspirators of attacking seven United States businesses during that period, adding that at least two of the United States businesses paid a combined $1.5 million in ransoms. In the court records, prosecutors claimed that victims of the ransomware group included an engineering firm and a bank. They claimed that executives of these firms received harassing phone calls after their networks were hit with distributed denial of service (DDoS) attacks. The Yanluowang ransomware group was fingered for the operation, with the prosecutors noting that they stole data belonging to the firms and encrypted it to extort money. Russian national pleads guilty to multiple ransomware activities The court filings for Volkov’s case did not exactly name Cisco, but the enterprise networking and security vendor said it was impacted by an attack that it attributed to Yanluowang ransomware in May 2022. During its investigation, Cisco realized that the credentials of one of its employees were compromised after an attacker gained control of a personal Google account where credentials saved in the victim’s browser were being synchronized. Cisco claimed that the attacker then carried out a series of sophisticated voice phishing attacks under the guise of trusted organizations, attempting to convince the victim to accept multi-factor authentication push notifications initiated by the attacker. After succeeding, the attacker then got access to the VPN in the context of the targeted user. In its report, Cisco claimed that the attack had links to an initial access broker with ties to several ransomware groups, including UNC2447, Lapsus$, and Yanluowang. Prosecutors claimed that the Russian was charged with identifying targets, exploiting vulnerabilities in their systems, and sharing access with co-conspirators for a flat fee or a percentage of the ransom payments made by the victims. Some of the Russian’s victims were unable to function properly without access to some of the data stolen and had to partially halt their operations or shut down permanently in the wake of the attacks, causing hindrance to users. Volkov awaits sentencing amid agreement to pay $9.2 million Prosecutors also claimed the group got $24 million from all seven ransomware victims. The FBI also traced cryptocurrency transactions related to the payments to accounts that were maintained by the Russian and another co-conspirator, CC-1, who they claimed resided in Indianapolis at the time. The FBI was able to confirm Volkov’s identity using blockchain analysis. They were also able to uncover multiple accounts used for communication within the group. In their communication, the group talked about ransomware attacks, payments, and splitting proceeds from their criminal activities. In the unsealed indictment, the Russian was arrested in January 2024 in Rome, where he had been living, and was later extradited to the United States and remains in custody in Indiana. Volkov previously filed an intention to plead guilty in April and agreed to have his case moved to Indiana. The Russian pleaded guilty to six charges, including unlawful transfer of a means of identification, trafficking in access information, access device fraud, conspiracy to commit computer fraud, aggravated identity theft, and conspiracy to commit money laundering. The plea agreement will also see Volkov pay a combined restitution of about $9.2 million to the seven victims. The smartest crypto minds already read our newsletter. Want in? Join them.

Ransomware plea puts Russian at risk of 53 years, $9.2M restitution

2025/11/08 17:18
4 min read

A Russian national has pleaded guilty to multiple charges connected to his participation in different ransomware attacks targeting individuals and corporations. The defendant, Aleksei Olegovich Volkov, also known as “chubaka.kor, faces a maximum penalty of up to 53 years in prison if he is found guilty.

According to court records, the Russian acted as the initial access broker for the Yanluowang ransomware group while being a resident in Russia from July 2021 to November 2022. Prosecutors accused Volkov and several unnamed co-conspirators of attacking seven United States businesses during that period, adding that at least two of the United States businesses paid a combined $1.5 million in ransoms.

In the court records, prosecutors claimed that victims of the ransomware group included an engineering firm and a bank. They claimed that executives of these firms received harassing phone calls after their networks were hit with distributed denial of service (DDoS) attacks. The Yanluowang ransomware group was fingered for the operation, with the prosecutors noting that they stole data belonging to the firms and encrypted it to extort money.

Russian national pleads guilty to multiple ransomware activities

The court filings for Volkov’s case did not exactly name Cisco, but the enterprise networking and security vendor said it was impacted by an attack that it attributed to Yanluowang ransomware in May 2022. During its investigation, Cisco realized that the credentials of one of its employees were compromised after an attacker gained control of a personal Google account where credentials saved in the victim’s browser were being synchronized.

Cisco claimed that the attacker then carried out a series of sophisticated voice phishing attacks under the guise of trusted organizations, attempting to convince the victim to accept multi-factor authentication push notifications initiated by the attacker. After succeeding, the attacker then got access to the VPN in the context of the targeted user. In its report, Cisco claimed that the attack had links to an initial access broker with ties to several ransomware groups, including UNC2447, Lapsus$, and Yanluowang.

Prosecutors claimed that the Russian was charged with identifying targets, exploiting vulnerabilities in their systems, and sharing access with co-conspirators for a flat fee or a percentage of the ransom payments made by the victims. Some of the Russian’s victims were unable to function properly without access to some of the data stolen and had to partially halt their operations or shut down permanently in the wake of the attacks, causing hindrance to users.

Volkov awaits sentencing amid agreement to pay $9.2 million

Prosecutors also claimed the group got $24 million from all seven ransomware victims. The FBI also traced cryptocurrency transactions related to the payments to accounts that were maintained by the Russian and another co-conspirator, CC-1, who they claimed resided in Indianapolis at the time. The FBI was able to confirm Volkov’s identity using blockchain analysis. They were also able to uncover multiple accounts used for communication within the group.

In their communication, the group talked about ransomware attacks, payments, and splitting proceeds from their criminal activities. In the unsealed indictment, the Russian was arrested in January 2024 in Rome, where he had been living, and was later extradited to the United States and remains in custody in Indiana. Volkov previously filed an intention to plead guilty in April and agreed to have his case moved to Indiana.

The Russian pleaded guilty to six charges, including unlawful transfer of a means of identification, trafficking in access information, access device fraud, conspiracy to commit computer fraud, aggravated identity theft, and conspiracy to commit money laundering. The plea agreement will also see Volkov pay a combined restitution of about $9.2 million to the seven victims.

The smartest crypto minds already read our newsletter. Want in? Join them.

Market Opportunity
Lorenzo Protocol Logo
Lorenzo Protocol Price(BANK)
$0.03798
$0.03798$0.03798
-2.69%
USD
Lorenzo Protocol (BANK) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Tokyo’s Metaplanet Launches Miami Subsidiary to Amplify Bitcoin Income

Tokyo’s Metaplanet Launches Miami Subsidiary to Amplify Bitcoin Income

Metaplanet Inc., the Japanese public company known for its bitcoin treasury, is launching a Miami subsidiary to run a dedicated derivatives and income strategy aimed at turning holdings into steady, U.S.-based cash flow. Japanese Bitcoin Treasury Player Metaplanet Opens Miami Outpost The new entity, Metaplanet Income Corp., sits under Metaplanet Holdings, Inc. and is based […]
Share
Coinstats2025/09/18 00:32
New 15% global tariff reshapes landscape – Commerzbank

New 15% global tariff reshapes landscape – Commerzbank

The post New 15% global tariff reshapes landscape – Commerzbank appeared on BitcoinEthereumNews.com. Commerzbank’s Economic Research team, led by Dr. Vincent Stamer
Share
BitcoinEthereumNews2026/02/23 21:03
The GENIUS Act Is Already Law. Banks Shouldn’t Try to Rewrite It Now

The GENIUS Act Is Already Law. Banks Shouldn’t Try to Rewrite It Now

The post The GENIUS Act Is Already Law. Banks Shouldn’t Try to Rewrite It Now appeared on BitcoinEthereumNews.com. Healthy competition drives innovation and better products for consumers; it is at the center of American economic leadership. Unfortunately, now that the bipartisan GENIUS Act has been signed into law, major legacy financial institutions seem to be having second thoughts about the innovations that stablecoins can bring to financial markets. Bank lobbying groups and public affairs teams have been peppering Congress with complaints about the law, urging members to reopen debate and introduce changes to the legislation that will ensure the stablecoin market doesn’t grow too quickly, protecting banks’ profits and stifling consumer choice. This reactionary response is both overblown and unnecessary. What legacy financial firms should do instead is embrace competition and offer exciting new products and services that consumers want, not try to kneecap emerging players through anti-innovation rules and regulations. The GENIUS Act was carefully designed with a thorough bipartisan process to strengthen consumer safeguards, ensure regulatory oversight, and preserve financial stability. Efforts to roll back its provisions are less about protecting families and more about protecting entrenched banking interests from the competition that helps ensure the U.S. banking system stays the strongest and most innovative in the world. Critics warn that allowing stablecoins to provide rewards could lead to massive deposit outflows from community banks, with figures as high as $6.6 trillion cited. But closer examination shows this fear is unfounded. A July 2025 analysis by consulting firm Charles River Associates found no statistically significant relationship between stablecoin adoption and community bank deposit outflows. In fact, the overwhelming majority of stablecoin reserves remain in the traditional financial system — either in commercial bank accounts or in short-term Treasuries — where they continue to support liquidity and credit in the broader U.S. economy. The dire estimates rely on unrealistic assumptions that every dollar of stablecoin issuance permanently…
Share
BitcoinEthereumNews2025/09/18 09:39