DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Ukrainian National Extradited from Spain to Face Conspiracy to Use Ransomware Charge

Posted on May 2, 2025 by Dissent

A press release from the Department of Justice

Defendant Allegedly Took Part in Global Ransomware Scheme Using “Nefilim” Ransomware Strain

Thursday, May 1, 2025

Earlier today, in federal court in Brooklyn, a superseding indictment was unsealed charging Artem Stryzhak with conspiracy to commit fraud and related activity, including extortion, in connection with computers, for his role in a series of international attacks using the Nefilim ransomware.  Stryzhak, a Ukrainian citizen, was arrested in Spain in June 2024 and extradited to the United States on April 30, 2025.  The arraignment will be held later today before United States Magistrate Judge Robert M. Levy.

John J. Durham, United States Attorney for the Eastern District of New York, and Christopher J.S. Johnson, Special Agent in Charge, Federal Bureau of Investigation, Springfield, Illinois Field Office (FBI), announced the charges.

“As alleged, the defendant was part of an international ransomware scheme in which he conspired to target high-revenue companies in the United States, steal data, and hold data hostage in exchange for payment.  If victims did not pay, the criminals then leaked the data online,” stated United States Attorney Durham.  “The criminals who carry out these malicious cyber-attacks often do so from abroad in the belief that American justice cannot reach them.  The extradition of the defendant and today’s charges prove that they are wrong.”

Mr. Durham also thanked the Justice Department’s Office of International Affairs, Computer Crime and Intellectual Property Section, the FBI’s New York Field Office and the Government of Spain for their crucial assistance in securing the arrest and extradition from Spain of Stryzhak.

“The FBI has long recognized that combating international ransomware schemes requires strong partnerships,” stated FBI Special Agent in Charge Johnson.  “The successful extradition of the defendant is a significant achievement in that ongoing collaboration and it sends a clear message: those who attempt to hide behind international borders to target American citizens will face justice.”

As alleged in the superseding indictment, Nefilim ransomware was deployed to encrypt computer networks in countries around the world, including in the Eastern District of New York.  These ransomware attacks caused millions of dollars in losses, both from ransomware payments and damage to victim computer systems.  The perpetrators of Nefilim typically customized the ransomware executable file for each victim, creating a unique decryption key and customized ransom notes.  If the victims paid the ransom demand, the perpetrators sent the decryption key, enabling the victims to decrypt the computer files locked by the ransomware program.

In June 2021, Nefilim administrators gave Stryzhak access to the Nefilim ransomware code in exchange for 20 percent of his ransom proceeds.  He operated the ransomware through his account on the online Nefilim platform, known as the “panel.”  When he first obtained access to the panel, Stryzhak asked a co‑conspirator whether he should choose a different username from the one he used in other criminal activities in case the panel “gets hacked into by the feds.”

Nefilim’s preferred ransomware targets were companies located in the United States, Canada, or Australia with more than $100 million in annual revenue. Stryzhak and others researched the companies to which they gained unauthorized access, including by using online databases to gather information about the victim companies’ net worth, size, and contact information.  In one exchange with Stryzhak in or about July 2021, a Nefilim administrator encouraged him to target companies in these countries with more than $200 million in annual revenue.

After gaining sufficient access to the victims’ networks, Stryzhak and his co‑conspirators stole data in furtherance of their scheme to extort ransom payments from them.  Nefilim ransom notes typically threatened the victims that unless they came to an agreement with the ransomware actors, the stolen data would be published on publicly accessible “Corporate Leaks” websites, which were maintained by Nefilim administrators.

The charges in the indictment are allegations and the defendant is presumed innocent unless and until proven guilty.  If convicted of the charge, Stryzhak faces up to five years’ imprisonment.

The government’s case is being handled by the Office’s National Security and Cybercrime Section.  Assistant United States Attorneys Alexander F. Mindlin and Ellen H. Sise of the Eastern District of New York and Trial Attorney Brian Mund of the Computer Crime and Intellectual Property Section are in charge of the prosecution, with assistance from Paralegal Specialist Rebecca Roth.

The Defendant:

ARTEM ALEKSANDROVYCH STRYZHAK
Age: 35
Barcelona, Spain

E.D.N.Y. Docket No. 23-CR-324 (PKC)

stryzhak_superseding_indictment_redacted.pdf

Source: U.S. Attorney’s Office, Eastern District of New York

Related:

  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
  • The Alliance That Wasn’t: A Critical Analysis of ReliaQuest’s Q3 2025 Ransomware Report
  • Heritage Provider Network $49.99M Class Action Settlement
  • Qilin Ransomware and the Ghost Bulletproof Hosting Conglomerate
  • Watsonville Community Hospital had a data breach -- or two. It would be helpful to know which.
Category: Malware

Post navigation

← Gov’t orders SKT to notify individual users whose data may have been breached
“SCAM” is a four-letter word: BreachForums edition (1) →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.