Skip to main content
Mallory

Criminal Sentencings for Cyber-Enabled Theft and Attacks

enforcement-actionfinancial-sector-threatransomware-group-operationcryptocurrency-platform-risk
Updated March 21, 2026 at 02:46 PM2 sources
Share:
Criminal Sentencings for Cyber-Enabled Theft and Attacks

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Recent court actions highlighted multiple cyber-enabled crimes resulting in prison sentences and follow-on legal measures. In the US, federal authorities announced sentencing and impending deportation of two Venezuelan nationals tied to a multi-state ATM jackpotting scheme that used Ploutus malware to force cash-out from legacy ATMs, with theft totaling hundreds of thousands of dollars and investigations linking activity to a broader network associated with Tren de Aragua. Separately in France, a Romanian national was sentenced in Paris to a five-year term with one year suspended (effectively four years to serve) for involvement in ransomware attacks using the “Umbrella” ransomware, with reported damages nearing €1 million and related cases spanning multiple European countries.

In a separate, unrelated case, Ilya Lichtenstein—convicted for stealing 120,000 bitcoins—publicly sought a “second chance” and a cybersecurity job after serving a 60-month sentence and being moved to home confinement, citing efforts to rehabilitate and cooperate. Collectively, the reporting underscores ongoing law-enforcement focus on financially motivated cybercrime ranging from malware-assisted physical compromise of financial infrastructure to enterprise-targeting ransomware, alongside continued public attention on high-profile cryptocurrency theft prosecutions.

Timeline

  1. Jan 25, 2026

    Nebraska case results in indictments of 54 alleged network members

    Authorities said the broader federal case in Nebraska led to indictments against 54 individuals linked to the larger criminal network associated with Tren de Aragua. The indictments marked a major law enforcement escalation in the ATM jackpotting investigation.

  2. Jan 25, 2026

    US announces sentencing and deportation of two ATM malware operators

    In January 2026, U.S. federal authorities announced the sentencing and impending deportation of Venezuelan nationals Luz Granados and Johan Gonzalez-Jimenez for their roles in the multi-state ATM jackpotting scheme. The case involved installing Ploutus malware on ATMs to empty bank cash reserves.

  3. Jan 23, 2026

    French court sentences Romanian man over ransomware attacks

    A Romanian national was sentenced in France to four years in prison for ransomware cyberattacks that caused nearly 1 million euros in damages. The sentencing was reported on the reference publication date, with no earlier event date provided in the source.

  4. Dec 31, 2025

    ATM jackpotting activity continues through late 2025

    The reported jackpotting activity spanned through December 2025, showing the campaign persisted for nearly two years against vulnerable legacy ATM infrastructure. The attacks stole hundreds of thousands of dollars in the South Carolina-linked case and were part of a much larger cash-out operation.

  5. Dec 31, 2025

    Federal investigation ties jackpotting scheme to wider criminal network

    During the multi-state investigation, U.S. authorities including the Secret Service and South Carolina Law Enforcement Division connected the South Carolina-linked ATM attacks to a broader federal case in Nebraska. The wider case ultimately identified a larger network allegedly responsible for more than $40 million in thefts.

  6. Feb 1, 2024

    ATM jackpotting campaign begins in southeastern US

    A broader ATM jackpotting operation linked to a criminal network associated with Tren de Aragua was active by February 2024, targeting older-model ATMs in the southeastern United States. Attackers physically accessed machines and used Ploutus malware on legacy systems, including Windows XP-based ATMs, to force cash dispensing.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Entities

Threat Actors

Malware

Organizations

Affected Products

Related Stories

Cybercrime Prosecutions: ATM Jackpotting Deportations and Ransomware Guilty Plea

Cybercrime Prosecutions: ATM Jackpotting Deportations and Ransomware Guilty Plea

U.S. authorities reported multiple enforcement actions against financially motivated cybercrime. In South Carolina, two Venezuelan nationals convicted in an **ATM jackpotting** scheme will be deported after serving their sentences; prosecutors said they physically accessed older ATM models, connected a laptop, and installed malware that bypassed security controls to force cash-out until the machines were emptied. The activity impacted banks across several southeastern states, with court-ordered restitution of **$285,100** and **$126,340** respectively, and investigators said evidence from the case contributed to a broader Nebraska indictment of dozens of individuals tied to a larger ATM-theft conspiracy. Separately, a Russian national, **Ianis Aleksandrovich Antropenko**, pleaded guilty in federal court to **conspiracy to commit money laundering** and **conspiracy to commit computer fraud and abuse** for leading a ransomware operation that targeted at least 50 victims over a four-year period ending in August 2022; he faces up to **25 years** in prison, financial penalties, restitution, and forfeiture, and the plea acknowledges potential immigration consequences. A third item describes convicted Bitcoin thief **Ilya Lichtenstein** seeking post-release work in cybersecurity, but it is not tied to the ATM jackpotting or Antropenko ransomware case and does not add incident-specific threat intelligence.

1 months ago
European and U.S. Law Enforcement Actions Against Cyber-Enabled Crime

European and U.S. Law Enforcement Actions Against Cyber-Enabled Crime

Multiple law-enforcement actions were reported across Europe and the U.S. targeting **cyber-enabled criminal activity**, including online intimidation, financial malware operations, and crypto/NFT theft. In Hungary, police working with Romanian authorities detained four young suspects accused of **swatting** and **doxing** tied to disputes initiated via *Discord*, including false bomb and violence threats that triggered significant emergency response deployments. Separately, U.S. authorities convicted two Venezuelan nationals for a multi-state **ATM jackpotting** operation in which they physically accessed older ATMs, connected a laptop, and deployed **malware** to force cash dispensing, resulting in hundreds of thousands of dollars in losses and restitution orders. In Romania, two suspects were investigated at the request of UK authorities over an alleged **hitman-for-hire** marketplace designed to conceal identities and payments via **cryptocurrency escrow**, with police seizing storage devices, crypto valued around **$650,000**, and significant cash. In the Netherlands, Zeeland police arrested four suspects linked to the theft of **169 NFTs** valued at roughly **€1.4 million**, seizing data carriers, cash, vehicles, and a house during raids as the investigation continued.

1 months ago
Law Enforcement Disrupts Cybercrime Networks and Arrests Ransomware and Fraud Suspects

Law Enforcement Disrupts Cybercrime Networks and Arrests Ransomware and Fraud Suspects

International and national law enforcement actions were reported targeting a range of cybercrime activity, including ransomware, extortion, and large-scale fraud. SentinelOne summarized multiple cases: Dutch authorities arrested a man accused of attempting to extort officials after receiving sensitive documents by mistake and refusing to delete them; Polish authorities detained a suspect linked to the **Phobos** ransomware-as-a-service ecosystem as part of Europol-coordinated **Operation Aether**, seizing materials such as stolen credentials and access information; and **Operation Red Card 2.0** (coordinated through Interpol/AFJOC) resulted in hundreds of arrests across multiple African countries, along with seizures of devices, takedowns of malicious sites, and recovery of funds tied to investment fraud and mobile-money/loan scams. Separately, Security Affairs’ weekly newsletter highlighted additional ongoing cyber risk items that align with the same broad theme of active cybercrime and enforcement pressure, including an **FBI warning** about a surge in **ATM jackpotting** losses and reporting on **Operation Red Card 2.0**. Other items in the Security Affairs roundup (e.g., additions to CISA’s KEV catalog, vendor/software issues, and various malware reports) were presented as a curated link list rather than a single unified incident. A SOCRadar profile on the China-attributed **Lotus Blossom** espionage group and a Tom’s Hardware historical piece on the first computer search warrant are not part of the law-enforcement disruption story and do not materially support the same specific event narrative.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.

Criminal Sentencings for Cyber-Enabled Theft and Attacks | Mallory