DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Former Conti member, now known as “Devman,” added to Interpol’s wanted list (updated)

Posted on January 16, 2026February 16, 2026 by Dissent
Nefedov1
Germany’s wanted poster for Oleg Evgenievich Nefedov

From the public prosecutor’s office in Frankfurt, Germany:

The Public Prosecutor General’s Office in Frankfurt am Main – Central Office for the Suppression of Internet Crime (ZIT) – and the German Federal Criminal Police Office (Bundeskriminalamt) request your assistance!

Oleg Evgenievich NEFEDOV (Нефедов Олег Евгеньевич) is wanted on suspicion of having formed a foreign criminal organisation and being involved in a particularly serious case of extortion as well as other offences.

Oleg Evgenievich NEFEDOV (or: Oleg Evgenyevich) is suspected of having formed the group responsible for the malware “Black Basta” and of having served as the group’s ringleader, which led to his playing a considerable part in global cyberattacks. In particular, it is suspected that the wanted person developed and established the ransomware Black Basta, acting under the pseudonyms <tramp>, <tr>, <gg>, <AA>, <kurva>, <Washingt0n> and <S.Jimmi>. He served as the head of the group. As such, he decided who or which organisations would be the targets of attacks, recruited members, assigned them tasks, took part in ransom negotiations, managed the ransom obtained by extortion and used it to pay the members of the group. As ringleader, the wanted person supported the continual use of the “Black Basta” ransomware as well as other malware programs that the group used to infiltrate foreign computer systems, steal data and encrypt systems in order to extort a ransom to be paid in cryptocurrencies in return for the decryption.

Further details

The group has been active since at least the beginning of 2022 and has used various malware programs, including the “Black Basta” ransomware – after which the group was named – in order to infect computer systems, steal sensitive data, encrypt systems and extort a ransom to be paid in cryptocurrencies in return for the decryption.

The person charged is suspected of being the founder and ringleader of the “Black Basta” group and as such, he is believed to be responsible for the extortion of more than 100 companies within the Federal Republic of Germany as well as approx. 600 others worldwide.

It may be assumed that the wanted person is living in the Russian Federation. The current whereabouts of the wanted person are unknown.

The police kindly ask you to provide information in response to the following questions:

  • Have you seen Oleg Evgenievich NEFEDOV?
  • Can you provide information on the current whereabouts of the wanted person?
  • Do you have any information indicating that the wanted person travelled outside the Russian Federation?
  • Were or are you in contact with the wanted person?
  • Do you have any information on online accounts or means of communication that the wanted person currently uses?

The information provided can be treated as confidential in justified cases.

The Bundeskriminalamt is aware of the “Black Basta leaks”, which went public at the beginning of 2025, as well as the “Conti leaks”, “Trickbot leaks” and “Trickleaks” that all went public at the beginning of 2022. Information relating to this data is not needed.

German Federal Criminal Police Office

Nefedov2
Interpol’s Red Notice

DataBreaches reported on Conti and Black Basta in past years. More recently, this site has reported on some of Devman’s activities.  In online communications via Tox, Devman stated that he does not attack Saudia Arabia or Israel, but otherwise, he thinks it is okay to encrypt hospitals. In comments to SuspectFile, he went even further and talked about possibly locking hospital’s medical devices. SuspectFile found his claims so disturbing that they removed an interview with him that they had recently published. When DataBreaches tried to confirm with Devman whether he was seriously considering locking medical device systems in hospitals, he did not respond directly to the question but expressed his anger at SuspectFile for sharing his comments with this site, even though his comments had not been off the record.

NOTE and Correction:  A previous version of this post’s headline noted that Devman was previously known as “Tramp” from Conti. DataBreaches has no proof of that, however, even though other sources have made that claim and it is alleged in the German law enforcement notice above.

Category: Commentaries and AnalysesMalware

Post navigation

← Website that leaked thousands of ICE agents’ personal information is down after DDoS attack
Act Now: Survey on Threats Researchers and Journalists Experience Ends January 18 →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • 45,000 malicious IP addresses taken down in international cyber operation
  • The Broken Records: tracing the human cost of the 2022 British MoD leak
  • Telus Digital confirms breach after ShinyHunters claims 1 petabyte data theft
  • China’s CERT warns OpenClaw can inflict nasty wounds
  • Bell Ambulance data breach impacted over 238,000 people
  • Lotte Card fined 9.6 billion won for leaking users’ social registration numbers
  • Handala claims responsibility for attack on medical device maker Stryker
  • Police Scotland fined £66k for extracting and sharing mobile phone data
  • The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in life
  • Viral ‘Quittr’ Porn Addiction App Exposed the Masturbation Habits of Hundreds of Thousands of Users

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • New data shows increase in FBI searches of Americans’ data last year
  • CalPrivacy Fines PlayOn Sports $1.1 Million for CCPA Violations Involving Student Privacy
  • 17 States Sues Trump Administration Over Unlawful Data Demands Targeting Colleges
  • Privacy watchdogs sound alarm over US bid to get travellers’ social media
  • Petition filed over misuse of protesters’ data by Kenyan government and telcos

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: Dissent.73

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.