Four REvil members sentenced to more than four years in prison

Avatar

Four members of the ransomware gang REvil were sentenced to multiple years in prison in Russia for charges related to hacking and money laundering.

The sentences for Artem Zayets, Alexey Malozemov, Daniil Puzyrevsky and Ruslan Khansvyarov were announced on Friday after the Russian military prosecutor’s office pushed last week for prison terms of up to six-and-a-half years. 

According to Russian media outlet Kommersant, the St. Petersburg Garrison Military Court announced Zayets and Malozemov were sentenced to four-and-a-half and five years, respectively, in a penal colony, while Khansvyarov and Puzyrevsky received five-and-a-half and six years. 

Puzyrevsky was seen as the group’s leader and could potentially face a fine in addition to the prison sentence. 

The four were part of an initial group of 14 people arrested by Russian authorities following tips sent by U.S. authorities. Eight men were eventually tried but four others were separated from the ones who were sentenced on Friday. 

All of the men were arrested in a series of raids across Russia in early 2022, before the invasion of Ukraine. Authorities reported at that time that they seized more than 426 million rubles ($4.38 million), $600,000 and €500,000 (about $544,000) in cash, along with cryptocurrency wallets, computers and nearly two dozen expensive cars.

A Russian state news outlet said the arrests took place after U.S. President Joe Biden personally spoke to Russian President Vladimir Putin about cyberattacks launched by the group.

The group was responsible for several high-profile incidents, including breaches at JBS, the world’s largest meatpacking company, and Kaseya, a popular software provider.

REvil eventually shut down in 2021 and prosecutors have spent years debating over the charges levied against the group’s members.

CybercrimeNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Researchers Discover Command Injection Flaw in Wi-Fi Alliance’s Test Suite

Next Post

Kremlin-linked hackers target Ukraine’s state, military agencies in new espionage campaign

Related Posts

Google Chrome Switches to ML-KEM for Post-Quantum Cryptography Defense

Google has announced that it will be switching from KYBER to ML-KEM in its Chrome web browser as part of its ongoing efforts to defend against the risk posed by cryptographically relevant quantum computers (CRQCs). "Chrome will offer a key share prediction for hybrid ML-KEM (codepoint 0x11EC)," David Adrian, David Benjamin, Bob Beck, and Devon O'Brien of the Chrome Team said. "The
Avatar
Read More