Nefilim ransomware suspect extradited from Spain to US

Avatar

A Ukrainian citizen has been charged and extradited to the United States for allegedly using Nefilim ransomware to attack large companies in the U.S. and elsewhere, federal prosecutors said Thursday.

Artem Stryzhak, 35, was arrested in Spain in 2024 and sent to the U.S. on Tuesday, according to a news release from the U.S. attorney for the Eastern District of New York. He was expected to appear Thursday before a federal judge in Brooklyn.

A highly redacted indictment unsealed Thursday describes the Nefilim ransomware scheme, alleging that Stryzhak and others agreed to give administrators 20 percent of their proceeds in exchange for access to the malware. Prosecutors focused on a spree that started in the summer of 2020 and continued into the fall of 2021.

Nefilim attacks have caused “millions of dollars in losses” overall between ransom payments and damage to computer systems, the news release said. The ransomware operation, also known as Nephilim, was a rebrand of an earlier scheme known as Nemty

Stryzhak’s access to the ransomware began in June 2021, prosecutors said, and he was encouraged to target companies in the U.S., Canada or Australia with more than $200 million in annual revenue. At its peak, Nefilim was known for securing larger payouts in comparison to other operations who were less choosy with targets.

The indictment says Nefilim victims in the U.S. included companies in industries such as aviation, engineering, chemicals, eyewear, insurance, construction, energy and pet care. The ransomware’s users also deployed otherwise legal tools such as the file-transfer software WinSCP and hacking platform Cobalt Strike, the indictment said.

“The perpetrators of Nefilim typically customized the ransomware executable file for each victim, creating a unique decryption key and customized ransom notes,” the news release said. “If the victims paid the ransom demand, the perpetrators sent the decryption key, enabling the victims to decrypt the computer files locked by the ransomware program.”

Stryzhak faces charges of conspiracy to commit fraud and related activity, including extortion, in connection with computers.

CybercrimeNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Joe Warminsky

is the news editor for Recorded Future News. He has more than 25 years experience as an editor and writer in the Washington, D.C., area. He previously he helped lead CyberScoop for more than five years. Prior to that, he was a digital editor at WAMU 88.5, the NPR affiliate in Washington, and he spent more than a decade editing coverage of Congress for CQ Roll Call.

 

Total
0
Shares
Previous Post

North Korean IT worker scam is now a threat to all companies, cybersecurity experts say

Next Post

More than 100,000 impacted by December data breach at Ascension Health

Related Posts

Hard-Coded Credentials Found in HPE Instant On Devices Allow Admin Access

Hewlett-Packard Enterprise (HPE) has released security updates to address a critical security flaw affecting Instant On Access Points that could allow an attacker to bypass authentication and gain administrative access to susceptible systems. The vulnerability, tracked as CVE-2025-37103, carries a CVSS score of 9.8 out of a maximum of 10.0. "Hard-coded login credentials were found in HPE
Avatar
Read More

Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI

Cisco has released security patches to address a critical security flaw impacting the Identity Services Engine (ISE) that, if successfully exploited, could allow unauthenticated actors to carry out malicious actions on susceptible systems. The security defect, tracked as CVE-2025-20286, carries a CVSS score of 9.9 out of 10.0. It has been described as a static credential vulnerability. "A
Avatar
Read More