DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Conti member indicted for role in 2021 Scripps Health ransomware attack

Posted on September 12, 2023 by Dissent

On September 7, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC), in coordination with the United Kingdom, sanctioned 11 individuals who are alleged to be part of the Russia-based Trickbot cybercrime group. At the same time, the U.S. Department of Justice (DOJ)  unsealed indictments against nine individuals in connection with the Trickbot malware and Conti ransomware schemes, including seven of the 11 individuals designated that day.

One of those individuals was Maksim Galochkin. As described by the government in its press announcement, Galochkin, who was also known by the online monikers “Bentley,” “Crypt,” and “Volhvb,” led a group of testers with responsibilities for development, supervision, and implementation of tests. The National Crime Agency also lists “Max17” as one of his monikers.

Additional information on him, provided by OFAC, includes that he is male, was born May 19,1982, and is a Russian national. Email Address: [email protected]; alt. Email Address [email protected]; alt. Email Address [email protected]; alt. Email Address [email protected]; Secondary sanctions risk: Ukraine-/Russia-Related Sanctions Regulations, 31 CFR 589.201 (individual) [CYBER2].

Additional context and background on Galochkin can be found in a fascinating piece by Matt Burgess and Lily Hay Newman of Wired. Their ability to unmask Galochkin was greatly enabled by research by NISOS.

Criminal Charges

Galochkin was originally charged in a sealed indictment filed in June 2023. The now-unsealed indictment charges that he and co-conspirators were responsible for accessing and damaging the computers of more than 900 victims worldwide. One of those victims was Scripps Health in the Southern District of California which was attacked in May 2021.

Story continues below the break.


Previous coverage of the Scripps Health ransomware incident can be found on DataBreaches at:

  • Scripps begins notifying more than 147,000 people of ransomware records breach
  • Healthcare provider expected to lose $106.8 million following ransomware attack
  • Scripps Breach Too California Heavy for Federal Courtroom
  • Update on Scripps’ ransomware incident
  • Even More Patient Data May Have Been Stolen in 2021 Ransomware Attack: Scripps Health
  • Updating Scripps Health ransomware incident: litigation settlement

The three counts of Galochkin’s indictment charge:

  • Unauthorized access to a protected computer in violation of Title 18, United States Code, Sections 1030 (a) (2) (C), (c) (2) (B), and 2;
  • Damage to a protected computer by transmission of Conti malware, in violation of Title 18, United States Code, Sections 1030 (a) (5) (A), (c) ( 4 ) (B), and 2. “The offense caused loss resulting from a related course of conduct affecting one or more protected computers aggregating at least $5,000 in value, the modification and impairment of the medical examination, diagnosis, treatment, and care of one or more individuals, a threat to public health and safety, and damage affecting 10 or more protected computers during a one-year period; and
  • Threatening to damage a protected computer by aiding and abetting the transmission of a ransom note, in violation Title 18, United States Code, Sections 1030 (a) (7) (C), (c)(3)(A), and 2.

Galochkin has been indicted but is not has not been caught or arrested at this point.

Category: Health DataMalwareOf NoteU.S.

Post navigation

← Texas Medical Liability Trust updates its data breach notification; now provides notification on behalf of almost 60,000 individuals
MO: Cyberattack causes multiple court systems to shut down some public safety computer servers →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ransomware Attack on ADP Partner Exposes Broadcom Employee Data
  • Anne Arundel ransomware attack compromised confidential health data, county says
  • Australian national known as “DR32” sentenced in U.S. federal court
  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices
  • Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations
  • Breachforums Boss “Pompompurin” to Pay $700k in Healthcare Breach
  • HHS Office for Civil Rights Settles HIPAA Cybersecurity Investigation with Vision Upright MRI
  • Additional 12 Defendants Charged in RICO Conspiracy for over $263 Million Cryptocurrency Thefts, Money Laundering, Home Break-Ins
  • RIBridges firewall worked. But forensic report says hundreds of alarms went unnoticed by Deloitte.
  • Chinese Hackers Hit Drone Sector in Supply Chain Attacks

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law
  • CFPB Quietly Kills Rule to Shield Americans From Data Brokers
  • South Korea fines Temu for data protection violations
  • The BR Privacy & Security Download: May 2025

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.