Moscow man accused of posing as FSB officer to extort Conti ransomware gang

A Moscow resident has been accused of trying to extort money from the notorious Conti ransomware group by posing as an officer of Russia’s Federal Security Service (FSB), according to local media reports.

Russian outlet RBC, citing sources familiar with the investigation, reported on Wednesday that the suspect, Ruslan Satuchin, allegedly presented himself as an FSB officer and demanded a large payment from Conti members in exchange for avoiding criminal prosecution.

The scheme allegedly began in September 2022, when Satuchin contacted one of Conti’s members and claimed to have influence over law enforcement activities targeting Conti, the sources said.

Satuchin denies wrongdoing. He is being held in pre-trial detention in Moscow after a criminal case was formally opened in September 2025. Police said he could interfere with witnesses if released. Defense lawyers requested house arrest, citing his family ties and saying made no attempt to flee despite knowing about the investigation.

If convicted, he could face up to 10 years in prison and a fine of up to 1 million rubles ($13,000).

Conti was one of the most active ransomware operations before shutting down in 2022. Cybersecurity researchers have linked the group to Russian-speaking cybercriminals and to attacks targeting governments, healthcare providers, schools and critical infrastructure worldwide.

Two coordinated tranches of sanctions by the United States and the United Kingdom in February and September 2023 publicly named members of the Conti/Ryuk ransomware network and linked them to the wider Trickbot cybercrime infrastructure.

The gang fractured following a major leak in early 2022, when a person claiming pro-Ukraine sympathies published internal Conti chat logs, source code and infrastructure documents after the group publicly backed Russia’s invasion of Ukraine.

Security researchers have said that while Conti as a brand disappeared, former members regrouped under new ransomware operations, including Royal, Black Basta and Akira.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Manual Processes Are Putting National Security at Risk

Next Post

Malicious NuGet Packages Stole ASP.NET Data; npm Package Dropped Malware

Related Posts

Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes

Cloud security is changing. Attackers are no longer just breaking down the door; they are finding unlocked windows in your configurations, your identities, and your code. Standard security tools often miss these threats because they look like normal activity. To stop them, you need to see exactly how these attacks happen in the real world. Next week, the Cortex Cloud team at Palo Alto Networks
Read More

⚡ Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More

This week saw a lot of new cyber trouble. Hackers hit Fortinet and Chrome with new 0-day bugs. They also broke into supply chains and SaaS tools. Many hid inside trusted apps, browser alerts, and software updates. Big firms like Microsoft, Salesforce, and Google had to react fast — stopping DDoS attacks, blocking bad links, and fixing live flaws. Reports also showed how fast fake news, AI
Read More

WatchGuard Warns of Active Exploitation of Critical Fireware OS VPN Vulnerability

WatchGuard has released fixes to address a critical security flaw in Fireware OS that it said has been exploited in real-world attacks. Tracked as CVE-2025-14733 (CVSS score: 9.3), the vulnerability has been described as a case of out-of-bounds write affecting the iked process that could allow a remote unauthenticated attacker to execute arbitrary code. "This vulnerability affects both the
Read More