Guilty Plea of Ukrainian National for Nefilim Ransomware Attacks
Artem Aleksandrovych Stryzhak, a Ukrainian national, pleaded guilty to conspiracy to commit computer fraud for his role in deploying Nefilim ransomware against high-revenue companies in the United States and other countries. Stryzhak and his co-conspirators generated unique ransomware executables, decryption keys, and ransom notes for each victim, targeting organizations with annual revenues exceeding $100 million and threatening to publish stolen data unless ransoms were paid. He was arrested in Spain in June 2024 and extradited to the United States, where he faces up to 10 years in prison. Authorities are still seeking his alleged co-conspirator, Volodymyr Tymoshchuk, and have announced an $11 million reward for information leading to his arrest or conviction.
The Nefilim ransomware group, for which Stryzhak operated, caused millions of dollars in losses through extortion payments and damage to victim networks. The group primarily targeted companies in the United States, Canada, and Australia, conducting research on potential victims to maximize the impact of their attacks. The U.S. Department of Justice highlighted the international scope of the operation and the significant financial and reputational harm inflicted on victim organizations. Stryzhak’s guilty plea marks a significant development in ongoing efforts to disrupt major ransomware operations and bring perpetrators to justice.
Timeline
May 6, 2026
Stryzhak's sentencing is scheduled for May 2026
Following his guilty plea, Stryzhak faces a maximum sentence of 10 years in prison. Court reporting indicates his sentencing is scheduled for May 6, 2026.
Dec 19, 2025
Artem Stryzhak pleads guilty in U.S. federal court
Stryzhak pleaded guilty to conspiracy to commit computer fraud for his role in Nefilim ransomware attacks targeting high-revenue companies in the U.S. and other countries. He admitted participating in extortion schemes that encrypted systems and threatened to leak stolen data.
Dec 19, 2025
U.S. offers $11 million reward for Volodymyr Tymoshchuk
The U.S. Department of State announced a reward of up to $11 million for information leading to the arrest or conviction of alleged Nefilim administrator Volodymyr Tymoshchuk. He remains at large and is accused of ties to multiple ransomware strains.
Apr 1, 2025
Stryzhak is extradited from Spain to the United States
After his arrest in Spain, Stryzhak was extradited to the U.S. to face federal charges related to conspiracy to commit computer fraud tied to Nefilim ransomware attacks. Reports place the extradition in April 2025.
Jun 1, 2024
Spanish authorities arrest Artem Stryzhak in Barcelona
Stryzhak was arrested in Spain in connection with his role in Nefilim ransomware attacks against organizations in the United States and other countries. Multiple reports place the arrest in June 2024.
Jun 1, 2021
Artem Stryzhak joins the Nefilim ransomware operation
Stryzhak gained access to the Nefilim ransomware code in exchange for a share of ransom proceeds and began participating as an affiliate. He used customized ransomware and ransom notes for individual victims.
Jan 1, 2020
Nefilim ransomware is first observed
Nefilim ransomware was first observed in 2020 and is described as a successor to Nemty. The group used an affiliate model and double-extortion tactics against large enterprises.
Jan 1, 2018
Tymoshchuk-linked ransomware attacks hit organizations in the U.S. and Europe
According to U.S. authorities, Volodymyr Tymoshchuk was involved in ransomware operations including Nefilim, LockerGoga, and MegaCortex that attacked hundreds of organizations in the U.S. and Europe, causing millions of dollars in damage. The activity spanned from 2018 to 2021.
See the full picture in Mallory
Mallory subscribers get deeper analysis on every story, including:
Who’s affected and how
Deep-dive technical analysis
Actionable next steps for your team
IPs, domains, hashes, and more
Ask questions and take action on every story
Filter by topic, classification, timeframe
Get matching stories delivered automatically
Related Entities
Threat Actors
Malware
Organizations
Sources
2 more from sources like data breaches net and cyberscoop
Related Stories

Guilty Plea of Yanluowang Ransomware Initial Access Broker
Aleksei Olegovich Volkov, a Russian national, pleaded guilty in the United States to charges related to his role as an initial access broker (IAB) for the Yanluowang ransomware group. Volkov provided access to at least seven U.S. organizations between July 2021 and November 2022, enabling the deployment of ransomware that resulted in ransom demands ranging from $300,000 to $15 million. He received a percentage of the ransom payments, including $94,259 from a $500,000 ransom and $162,220 from a $1 million ransom, and was ordered to pay nearly $9.2 million in restitution to affected organizations. Volkov's activities were uncovered through digital forensics, including chat logs, cryptocurrency records, and social media accounts, and he was extradited to the U.S. after being apprehended in Rome. The indictment and plea agreement detail Volkov's collaboration with co-conspirators, his use of aliases such as "chubaka.kor," and his involvement in negotiating ransom payments and providing network credentials to the Yanluowang group. The attacks affected a range of U.S. businesses, including engineering firms, banks, and telecommunications providers, with some victims able to restore from backups and avoid ransom payments. Volkov faces up to 53 years in prison for charges including access device fraud, aggravated identity theft, and conspiracy to commit money laundering and computer fraud.
1 months ago
Phobos Ransomware Administrator Evgenii Ptitsyn Pleads Guilty in U.S. Case
U.S. prosecutors said **Evgenii Ptitsyn**, a 43-year-old Russian national described as an administrator/leader behind the **Phobos** ransomware operation, pleaded guilty to **wire fraud conspiracy** tied to a global ransomware-and-extortion scheme. Court filings and DOJ statements cited in reporting say Phobos and its affiliates victimized **more than 1,000 organizations** worldwide and extorted **over $39 million**, with victims including U.S. healthcare providers, hospitals, educational institutions, and other essential services. Ptitsyn was arrested in **South Korea** and later extradited to the United States; he faces a **maximum of 20 years** in prison. Authorities described Phobos as an affiliate-driven operation in which administrators developed and distributed the ransomware, coordinated sales via a **darknet site**, and advertised services on criminal forums/messaging platforms, while affiliates typically gained access to victim networks—often using **stolen credentials**—to steal and encrypt data and then demand payment for decryption. Reporting also described a fee/revenue model in which affiliates paid administrators for **unique decryption keys** and administrators took a cut of proceeds; Ptitsyn agreed to forfeit **$1.77 million** and pay at least **$39.3 million** in restitution. Additional context in coverage linked Phobos to related activity (including the **8Base** strain) and noted prior law-enforcement actions against other alleged members, as well as the release of a **free Phobos decryption tool** by Japanese authorities.
1 months ago
Guilty Pleas in Major Cyber-Enabled Fraud and Ransomware Operations
U.S. authorities secured guilty pleas in two separate cyber-enabled criminal cases: a Ghana-based fraud ring that stole more than **$100 million** via **business email compromise (BEC)** and romance scams, and a **Phobos** ransomware administrator tied to a global extortion operation. The cases highlight parallel monetization paths—social engineering and payment redirection in BEC/romance schemes versus data encryption and extortion in ransomware-as-a-service (RaaS)—and both involve international arrests/extraditions to the United States. In the fraud case, **Derrick Van Yeboah** (40) pleaded guilty to conspiracy to commit wire fraud and agreed to pay **over $10 million** in restitution for his role in a Ghana-based operation that targeted U.S. victims from 2016 to May 2023, using spoofed emails to impersonate customers/employees and laundering proceeds through U.S. intermediaries before sending funds to coordinators in West Africa. Separately, **Evgenii Ptitsyn** (43) pleaded guilty to wire fraud conspiracy for helping develop, sell, distribute, and operate the **Phobos** ransomware platform, which the U.S. DoJ says hit **1,000+** entities and extorted **$16+ million**; he was arrested in South Korea in 2024, extradited to the U.S., and faces up to **20 years** in prison, with sentencing scheduled for July 15.
1 months ago