Nefilim ransomware hacker pleads guilty to computer fraud

A former ransomware hacker pleaded guilty on Friday in the Eastern District of New York to one charge stemming from attacks on several companies in the U.S., Canada and Australia.

Artem Aleksandrovych Stryzhak, a 35-year-old Ukrainian national, was arrested in Barcelona last year before being extradited in April.

Stryzhak used the Nefilim ransomware strain to carry out the attacks. He was given access to the ransomware in June 2021 and agreed to pay the developers 20% of the ransoms he received, prosecutors said. 

He pleaded guilty to one count of conspiracy to commit computer fraud and is facing a maximum sentence of 10 years in prison. His sentencing is scheduled for May. 

The operators behind Nefilim attacked and targeted companies with more than $100 million in revenue and prosecutors said the group caused “millions of dollars in losses” overall between ransom payments and damage to computer systems. 

According to the indictment, Nefilim victims in the U.S. included companies in industries such as aviation, engineering, chemicals, eyewear, insurance, construction, energy and pet care. 

The Justice Department said it is still offering a reward of $11 million for information about Volodymyr Tymoshchuk, one of Stryzhak’s charged co-conspirators. 

Prosecutors previously said Tymoshchuk was an administrator for Nefilim as well as two now-defunct ransomware strains known as LockerGoga and MegaCortex.

Between December 2018 and October 2021, Tymoshchuk allegedly used the ransomware strains to attack hundreds of organizations across the U.S. and Europe, causing millions of dollars in damage, the DOJ said

Tymoshchuk was connected to ransomware organizations that have extorted more than 250 companies across the U.S., acting Assistant Attorney General Matthew Galeotti said.

The LockerGoga ransomware was best known for its 2019 attack on Norwegian aluminum giant Norsk Hydro.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Romanian national water agency hit by BitLocker ransomware attack

Next Post

Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens

Related Posts

npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels

Cybersecurity researchers have identified several malicious packages across npm, Python, and Ruby ecosystems that leverage Discord as a command-and-control (C2) channel to transmit stolen data to actor-controlled webhooks. Webhooks on Discord are a way to post messages to channels in the platform without requiring a bot user or authentication, making them an attractive mechanism for attackers to
Read More

Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers

A suspected Russia-aligned group has been attributed to a phishing campaign that employs device code authentication workflows to steal victims' Microsoft 365 credentials and conduct account takeover attacks. The activity, ongoing since September 2025, is being tracked by Proofpoint under the moniker UNK_AcademicFlare. The attacks involve using compromised email addresses belonging to government
Read More

ThreatsDay Bulletin: $176M Crypto Fine, Hacking Formula 1, Chromium Vulns, AI Hijack & More

Criminals don’t need to be clever all the time; they just follow the easiest path in: trick users, exploit stale components, or abuse trusted systems like OAuth and package registries. If your stack or habits make any of those easy, you’re already a target. This week’s ThreatsDay highlights show exactly how those weak points are being exploited — from overlooked
Read More