Nefilim ransomware hacker pleads guilty to computer fraud

A former ransomware hacker pleaded guilty on Friday in the Eastern District of New York to one charge stemming from attacks on several companies in the U.S., Canada and Australia.

Artem Aleksandrovych Stryzhak, a 35-year-old Ukrainian national, was arrested in Barcelona last year before being extradited in April.

Stryzhak used the Nefilim ransomware strain to carry out the attacks. He was given access to the ransomware in June 2021 and agreed to pay the developers 20% of the ransoms he received, prosecutors said. 

He pleaded guilty to one count of conspiracy to commit computer fraud and is facing a maximum sentence of 10 years in prison. His sentencing is scheduled for May. 

The operators behind Nefilim attacked and targeted companies with more than $100 million in revenue and prosecutors said the group caused “millions of dollars in losses” overall between ransom payments and damage to computer systems. 

According to the indictment, Nefilim victims in the U.S. included companies in industries such as aviation, engineering, chemicals, eyewear, insurance, construction, energy and pet care. 

The Justice Department said it is still offering a reward of $11 million for information about Volodymyr Tymoshchuk, one of Stryzhak’s charged co-conspirators. 

Prosecutors previously said Tymoshchuk was an administrator for Nefilim as well as two now-defunct ransomware strains known as LockerGoga and MegaCortex.

Between December 2018 and October 2021, Tymoshchuk allegedly used the ransomware strains to attack hundreds of organizations across the U.S. and Europe, causing millions of dollars in damage, the DOJ said

Tymoshchuk was connected to ransomware organizations that have extorted more than 250 companies across the U.S., acting Assistant Attorney General Matthew Galeotti said.

The LockerGoga ransomware was best known for its 2019 attack on Norwegian aluminum giant Norsk Hydro.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Romanian national water agency hit by BitLocker ransomware attack

Next Post

Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens

Related Posts

Researchers Find Malicious VS Code, Go, npm, and Rust Packages Stealing Developer Data

Cybersecurity researchers have discovered two new extensions on Microsoft Visual Studio Code (VS Code) Marketplace that are designed to infect developer machines with stealer malware. The VS Code extensions masquerade as a premium dark theme and an artificial intelligence (AI)-powered coding assistant, but, in actuality, harbor covert functionality to download additional payloads, take
Read More

From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation

Fortra on Thursday revealed the results of its investigation into CVE-2025-10035, a critical security flaw in GoAnywhere Managed File Transfer (MFT) that's assessed to have come under active exploitation since at least September 11, 2025. The company said it began its investigation on September 11 following a "potential vulnerability" reported by a customer, uncovering "potentially suspicious
Read More