DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Conti member indicted for role in 2021 Scripps Health ransomware attack

Posted on September 12, 2023 by Dissent

On September 7, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC), in coordination with the United Kingdom, sanctioned 11 individuals who are alleged to be part of the Russia-based Trickbot cybercrime group. At the same time, the U.S. Department of Justice (DOJ)  unsealed indictments against nine individuals in connection with the Trickbot malware and Conti ransomware schemes, including seven of the 11 individuals designated that day.

One of those individuals was Maksim Galochkin. As described by the government in its press announcement, Galochkin, who was also known by the online monikers “Bentley,” “Crypt,” and “Volhvb,” led a group of testers with responsibilities for development, supervision, and implementation of tests. The National Crime Agency also lists “Max17” as one of his monikers.

Additional information on him, provided by OFAC, includes that he is male, was born May 19,1982, and is a Russian national. Email Address: [email protected]; alt. Email Address [email protected]; alt. Email Address [email protected]; alt. Email Address [email protected]; Secondary sanctions risk: Ukraine-/Russia-Related Sanctions Regulations, 31 CFR 589.201 (individual) [CYBER2].

Additional context and background on Galochkin can be found in a fascinating piece by Matt Burgess and Lily Hay Newman of Wired. Their ability to unmask Galochkin was greatly enabled by research by NISOS.

Criminal Charges

Galochkin was originally charged in a sealed indictment filed in June 2023. The now-unsealed indictment charges that he and co-conspirators were responsible for accessing and damaging the computers of more than 900 victims worldwide. One of those victims was Scripps Health in the Southern District of California which was attacked in May 2021.

Story continues below the break.


Previous coverage of the Scripps Health ransomware incident can be found on DataBreaches at:

  • Scripps begins notifying more than 147,000 people of ransomware records breach
  • Healthcare provider expected to lose $106.8 million following ransomware attack
  • Scripps Breach Too California Heavy for Federal Courtroom
  • Update on Scripps’ ransomware incident
  • Even More Patient Data May Have Been Stolen in 2021 Ransomware Attack: Scripps Health
  • Updating Scripps Health ransomware incident: litigation settlement

The three counts of Galochkin’s indictment charge:

  • Unauthorized access to a protected computer in violation of Title 18, United States Code, Sections 1030 (a) (2) (C), (c) (2) (B), and 2;
  • Damage to a protected computer by transmission of Conti malware, in violation of Title 18, United States Code, Sections 1030 (a) (5) (A), (c) ( 4 ) (B), and 2. “The offense caused loss resulting from a related course of conduct affecting one or more protected computers aggregating at least $5,000 in value, the modification and impairment of the medical examination, diagnosis, treatment, and care of one or more individuals, a threat to public health and safety, and damage affecting 10 or more protected computers during a one-year period; and
  • Threatening to damage a protected computer by aiding and abetting the transmission of a ransom note, in violation Title 18, United States Code, Sections 1030 (a) (7) (C), (c)(3)(A), and 2.

Galochkin has been indicted but is not has not been caught or arrested at this point.

Category: Health DataMalwareOf NoteU.S.

Post navigation

← Texas Medical Liability Trust updates its data breach notification; now provides notification on behalf of almost 60,000 individuals
MO: Cyberattack causes multiple court systems to shut down some public safety computer servers →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • $28 million in Texas’ cybersecurity funding for schools left unspent
  • Cybersecurity incident at Central Point School District 6
  • Official Indiana .gov email addresses are phishing residents
  • Turkish Group Hacks Zero-Day Flaw to Spy on Kurdish Forces
  • Cyberattacks on Long Island Schools Highlight Growing Threat
  • Dior faces scrutiny, fine in Korea for insufficient data breach reporting; data of wealthy clients in China, South Korea stolen
  • Administrator Of Online Criminal Marketplace Extradited From Kosovo To The United States
  • Twilio denies breach following leak of alleged Steam 2FA codes
  • Personal information exposed by Australian Human Rights Commission data breach
  • International cybercrime tackled: Amsterdam police and FBI dismantle proxy service Anyproxy

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • South Korea fines Temu for data protection violations
  • The BR Privacy & Security Download: May 2025
  • License Plate Reader Company Flock Is Building a Massive People Lookup Tool, Leak Shows
  • FTC dismisses privacy concerns in Google breakup
  • ARC sells airline ticket records to ICE and others
  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.