Basketball player arrested for alleged ransomware ties freed in Russia-France prisoner swap

A Russian basketball player accused of being involved in a ransomware gang was freed in a prisoner exchange between Russia and France. 

Daniil Kasatkin, 26, was seen in a video shared by Russian state news outlet TASS emerging from a plane that was then used to send French researcher Laurent Vinatier back to France. Vinatier was sentenced to three years in prison after Russian officials accused him of violating “foreign agent” laws.

Kasatkin was detained in June at Paris’s Charles de Gaulle Airport shortly after arriving in the country with his fiancée. He was held in French extradition custody after U.S. prosecutors issued a warrant for his arrest based on accusations that he served as a negotiator for an unnamed ransomware gang that attacked about 900 organizations between 2020 and 2022. 

He was charged with conspiracy to commit computer fraud. While the ransomware gang was never named, the Justice Department previously said the now-defunct Conti ransomware group attacked more than 900 victims worldwide. 

The U.S. State Department did not respond to requests for comment about whether they were notified that France would be trading Kasatkin for Vinatier. News outlet AFP reported that French officials did inform the U.S. government that it was sending Kasatkin back to Russia in exchange for Vinatier. 

Kasatkin previously studied and played basketball in the U.S. at Penn State University in the 2018-2019 season before spending four years playing professionally with Moscow’s MBA-MBAI.

His lawyer told French news outlets that Kasatkin was not involved in ransomware attacks and claimed the accusations related to a second-hand computer he purchased. 

A Russian Telegram channel focused on sports news claimed U.S. authorities had been tracking Kasatkin since early 2025, and the arrest warrant was issued just one day before his arrival in France. 

U.S. officials have had recent success in extraditing hackers accused of assisting Russian ransomware gangs and hacktivist groups. Another alleged Conti member was extradited from Ireland in October and Ukraine sent a prominent hacker to the U.S. last month.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines

Next Post

Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime

Related Posts

New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs

Cybersecurity researchers have shed light on a new campaign that has likely targeted the Russian automobile and e-commerce sectors with a previously undocumented .NET malware dubbed CAPI Backdoor. According to Seqrite Labs, the attack chain involves distributing phishing emails containing a ZIP archive as a way to trigger the infection. The cybersecurity company's analysis is based on the ZIP
Read More

Nigeria Arrests RaccoonO365 Phishing Developer Linked to Microsoft 365 Attacks

Authorities in Nigeria have announced the arrest of three "high-profile internet fraud suspects" who are alleged to have been involved in phishing attacks targeting major corporations, including the main developer behind the RaccoonO365 phishing-as-a-service (PhaaS) scheme. The Nigeria Police Force National Cybercrime Centre (NPF–NCCC) said investigations conducted in collaboration with
Read More

Beware the Hidden Costs of Pen Testing

Penetration testing helps organizations ensure IT systems are secure, but it should never be treated in a one-size-fits-all approach. Traditional approaches can be rigid and cost your organization time and money – while producing inferior results.  The benefits of pen testing are clear. By empowering “white hat” hackers to attempt to breach your system using similar tools and techniques to
Read More