Technology

U.S. Government Moves Aggressively Against Russian Hacking Groups

The U.S. Justice Department and Treasury Department are cracking down on Russian ransomware groups through criminal prosecutions, financial sanctions, and cyber infrastructure disruption. Recent convi

Martin HollowayPublished 9h ago4 min readBased on 9 sources
Reading level
U.S. Government Moves Aggressively Against Russian Hacking Groups

U.S. Government Moves Aggressively Against Russian Hacking Groups

A Latvian man has been sentenced to 102 months in federal prison for his role in a major Russian ransomware operation that attacked over 54 companies. The sentence marks the latest conviction in what amounts to a sustained crackdown by the U.S. Department of Justice against Eastern European cybercrime networks. The defendant worked for the operation between June 2021 and August 2023.

What Is Ransomware?

Ransomware is a type of malicious software that locks up a company's or organization's computer systems, making them unusable. The criminals then demand payment—ransom—to unlock the systems and restore access. It's similar to a traditional kidnapping, except the target is data rather than a person. Over the past decade, ransomware has become one of the most profitable forms of cybercrime, with criminal groups operating almost like legitimate businesses.

Phobos Group's Extortion Network

Federal prosecutors have brought charges against Roman Berezhnoy, 33, and Egor Nikolaevich Glebov, 39, both Russian nationals. They allegedly ran the Phobos ransomware group, which targeted more than 1,000 organizations worldwide and collected over $16 million in ransom payments. The group also operated under other names, including "8Base," to hide its identity.

What makes this operation noteworthy is its structure. The two leaders didn't act alone. Instead, they offered their ransomware software to other criminals who could launch attacks independently—a model sometimes called "ransomware-as-a-service." Think of it like a franchise: the main operators provide the technology and tools, while affiliate criminals do the actual attacking and collect a cut of the ransom.

Historically, bringing Russian criminals to justice has been difficult because the U.S. and Russia don't have an extradition agreement. The fact that Berezhnoy and Glebov have been charged suggests they may have been arrested while traveling outside Russia, or that international law enforcement cooperation enabled the charges.

Government's Multi-Part Strategy

The Justice Department has paired criminal prosecutions with financial penalties. The Treasury Department has sanctioned Dmitry Yuryevich Khoroshev, identified as the leader of LockBit, another major ransomware operation. LockBit was the largest ransomware group in the world, responsible for roughly a quarter of all ransomware attacks it tracked.

The Treasury's action freezes any U.S.-based assets these individuals may have and makes it illegal for American companies and citizens to do business with them. The government has also sanctioned other LockBit members. Additionally, federal agencies disrupted LockBit's computer infrastructure, effectively shutting down key parts of the operation.

The Justice Department has also charged four Russian government officials with cyber attacks targeting critical global infrastructure—suggesting connections between Russia's government and criminal hacking groups.

Why This Matters

The broader context here is that the U.S. government is using more tools than it did in the past. Rather than relying solely on criminal charges that rarely lead to actual arrests, the government is now combining prosecutions, financial sanctions, and infrastructure shutdowns to damage these operations.

By targeting both the leaders and the affiliate attackers in groups like Phobos, prosecutors are trying to disrupt the economics that keep ransomware profitable. If attackers face real legal risk and can't easily move money or access the tools they need, the thinking goes, some may decide the business is no longer worth the danger.

However, there's a genuine challenge here. The fundamental reasons ransomware remains attractive to criminals haven't changed much: it's relatively easy to get started, the profit margins are large, and Russia has shown little willingness to cooperate in extraditing its own citizens. These prosecutions and sanctions impose real costs on the criminals involved, but they don't address the underlying conditions that make ransomware so profitable in the first place.

Whether this enforcement push will meaningfully reduce ransomware attacks remains an open question. The real test isn't how many criminals get indicted—it's whether actual attacks against American and Western targets decline in number and sophistication.

U.S. Government Moves Aggressively Against Russian Hacking Groups | The Brief