Phobos ransomware leader facing 20 years in prison after pleading guilty to hacking charges

A 43-year-old Russian national pleaded guilty to wire fraud charges on Wednesday after U.S. prosecutors accused him of being a key figure in the Phobos ransomware gang. 

Evgenii Ptitsyn will be sentenced on July 15 and is facing a maximum penalty of 20 years in prison 

Ptitsyn and several others began using the Phobos ransomware in November 2020, attacking more than 1,000 organizations around the world. He was arrested in South Korea and extradited in November 2024.

The indictment of Ptitsyn revealed significant information about the group’s inner workings and victims.

Ptitsyn was the key developer behind Phobos and offered it to other cybercriminal affiliates who launched attacks on the gang’s behalf — taking a cut of all ransoms received. He marketed the ransomware on cybercriminal forums and ran the gang’s darknet website, where data stolen from victims was sold. 

Prosecutors accused Ptitsyn of being behind attacks on the California public school system — which paid a $300,000 ransom in 2023 — as well as multiple healthcare organizations and several companies.

U.S. prosecutors previously said operators of Phobos and a related strain called 8Base collected upwards of $16 million from victims worldwide dating back to 2019.

Law enforcement agencies in the U.S. and Europe have arrested and prosecuted multiple members of the group over the last two years, including a 47-year-old man detained in Poland three weeks ago. Several members were arrested and deported from Thailand last year. 

Last July, Japanese officials published a free Phobos ransomware decryption tool and a guide in English for organizations impacted by the group’s attacks.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Google says 90 zero-days exploited in 2025 as commercial vendor activity grows

Next Post

Ukrainian women fleeing war exploited in multimillion-dollar gambling fraud scheme

Related Posts

GoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentials

A new wave of GoBruteforcer attacks has targeted databases of cryptocurrency and blockchain projects to co-opt them into a botnet that's capable of brute-forcing user passwords for services such as FTP, MySQL, PostgreSQL, and phpMyAdmin on Linux servers. "The current wave of campaigns is driven by two factors: the mass reuse of AI-generated server deployment examples that propagate common
Read More

AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries

A Russian-speaking, financially motivated threat actor has been observed taking advantage of commercial generative artificial intelligence (AI) services to compromise over 600 FortiGate devices located in 55 countries. That's according to new findings from Amazon Threat Intelligence, which said it observed the activity between January 11 and February 18, 2026. "No exploitation of FortiGate
Read More