Four REvil members sentenced to more than four years in prison

Avatar

Four members of the ransomware gang REvil were sentenced to multiple years in prison in Russia for charges related to hacking and money laundering.

The sentences for Artem Zayets, Alexey Malozemov, Daniil Puzyrevsky and Ruslan Khansvyarov were announced on Friday after the Russian military prosecutor’s office pushed last week for prison terms of up to six-and-a-half years. 

According to Russian media outlet Kommersant, the St. Petersburg Garrison Military Court announced Zayets and Malozemov were sentenced to four-and-a-half and five years, respectively, in a penal colony, while Khansvyarov and Puzyrevsky received five-and-a-half and six years. 

Puzyrevsky was seen as the group’s leader and could potentially face a fine in addition to the prison sentence. 

The four were part of an initial group of 14 people arrested by Russian authorities following tips sent by U.S. authorities. Eight men were eventually tried but four others were separated from the ones who were sentenced on Friday. 

All of the men were arrested in a series of raids across Russia in early 2022, before the invasion of Ukraine. Authorities reported at that time that they seized more than 426 million rubles ($4.38 million), $600,000 and €500,000 (about $544,000) in cash, along with cryptocurrency wallets, computers and nearly two dozen expensive cars.

A Russian state news outlet said the arrests took place after U.S. President Joe Biden personally spoke to Russian President Vladimir Putin about cyberattacks launched by the group.

The group was responsible for several high-profile incidents, including breaches at JBS, the world’s largest meatpacking company, and Kaseya, a popular software provider.

REvil eventually shut down in 2021 and prosecutors have spent years debating over the charges levied against the group’s members.

CybercrimeNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Senator questions internet domain companies over Russian disinformation charges

Next Post

Kremlin-linked hackers target Ukraine’s state, military agencies in new espionage campaign

Related Posts

CISA Warns of CentreStack’s Hard-Coded MachineKey Vulnerability Enabling RCE Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting Gladinet CentreStack to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerability, tracked as CVE-2025-30406 (CVSS score: 9.0), concerns a case of a hard-coded cryptographic key that could be abused to achieve remote
Avatar
Read More

100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads

An unknown threat actor has been attributed to creating several malicious Chrome Browser extensions since February 2024 that masquerade as seemingly benign utilities but incorporate covert functionality to exfiltrate data, receive commands, and execute arbitrary code. "The actor creates websites that masquerade as legitimate services, productivity tools, ad and media creation or analysis
Avatar
Read More

⚡ Weekly Recap: iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More

Some of the biggest security problems start quietly. No alerts. No warnings. Just small actions that seem normal but aren't. Attackers now know how to stay hidden by blending in, and that makes it hard to tell when something’s wrong. This week’s stories aren’t just about what was attacked—but how easily it happened. If we’re only looking for the obvious signs, what are we missing right in front
Avatar
Read More