Skip to main content
Mallory

Poland Arrests Suspected Phobos Ransomware Affiliate in Europol Operation Aether

ransomware-group-operationenforcement-actioncybercrime-service-ecosystemcredential-access-method
Updated March 21, 2026 at 02:31 PM8 sources
Share:
Poland Arrests Suspected Phobos Ransomware Affiliate in Europol Operation Aether

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Polish law enforcement arrested a 47-year-old man in the Małopolska/Lesser Poland region on suspicion of involvement with the Phobos ransomware operation as part of Europol-coordinated Operation Aether targeting Phobos-linked infrastructure and affiliates. During a search of the suspect’s residence, Poland’s Central Bureau/Central Office for Combating Cybercrime (CBZC) seized devices and data investigators said could enable unauthorized access and ransomware activity, including stolen credentials, passwords, credit card numbers, and server IP/access data.

Authorities said technical analysis indicated the seized materials could be used to breach electronic security and support “various attacks, including ransomware,” and alleged the suspect used encrypted messaging to communicate with the Phobos criminal group. Reporting also noted the seizure of a laptop and multiple smartphones, and that the suspect was charged with offenses related to creating/acquiring/sharing tools or data used to unlawfully obtain information and facilitate unauthorized system access; if convicted, he faces up to five years in prison. Operation Aether reporting additionally linked the enforcement activity to efforts against 8Base, described as a ransomware group believed to be connected to Phobos.

Timeline

  1. Feb 17, 2026

    Investigators seize devices and cybercrime data in the Poland raid

    During the raid, police seized a laptop or computer, multiple smartphones, payment cards, and other items, and reported finding stolen credentials, passwords, credit card numbers, server IP addresses, and related access data. Investigators said the materials could facilitate unauthorized access and ransomware attacks.

  2. Feb 17, 2026

    Polish police arrest and charge alleged Phobos affiliate

    Poland's Central Bureau of Cybercrime Control arrested a 47-year-old man in the Małopolska region on suspicion of involvement with the Phobos ransomware operation. Authorities said he used encrypted messaging to communicate with the group and charged him with creating, obtaining, and sharing tools used for illegal access to IT systems.

  3. Feb 1, 2025

    Europol-led Operation Aether identifies a Polish Phobos suspect

    A Europol-led multinational operation conducted in February 2025, referred to in reporting as Operation Aether, identified a suspect in Poland allegedly tied to the Phobos ransomware ecosystem. The operation targeted Phobos operators, affiliates, and infrastructure internationally.

  4. Nov 1, 2024

    Alleged Phobos administrator Evgenii Ptitsyn is extradited to the US

    In November 2024, alleged Phobos developer and administrator Evgenii Ptitsyn was extradited from South Korea to the United States to face cybercrime charges tied to Phobos development and operations. Reporting says Phobos-linked activity declined after his extradition.

  5. Feb 1, 2024

    US authorities warn Phobos is hitting critical infrastructure

    In February 2024, U.S. authorities warned that Phobos ransomware was affecting U.S. state, local, tribal, and territorial governments and other critical infrastructure organizations. The warning highlighted the growing operational impact of the ransomware-as-a-service group.

  6. Jun 1, 2023

    8Base ransomware activity increases as a Phobos-linked spinoff

    The 8Base ransomware group, described as linked to the Phobos ecosystem, increased its activity in summer 2023 and claimed several high-profile victims. Later reporting connected 8Base to broader law-enforcement actions targeting Phobos infrastructure and affiliates.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Sources

3 more from sources like the record media, register security and data breaches net

Related Stories

Phobos Ransomware Administrator Evgenii Ptitsyn Pleads Guilty in U.S. Case

Phobos Ransomware Administrator Evgenii Ptitsyn Pleads Guilty in U.S. Case

U.S. prosecutors said **Evgenii Ptitsyn**, a 43-year-old Russian national described as an administrator/leader behind the **Phobos** ransomware operation, pleaded guilty to **wire fraud conspiracy** tied to a global ransomware-and-extortion scheme. Court filings and DOJ statements cited in reporting say Phobos and its affiliates victimized **more than 1,000 organizations** worldwide and extorted **over $39 million**, with victims including U.S. healthcare providers, hospitals, educational institutions, and other essential services. Ptitsyn was arrested in **South Korea** and later extradited to the United States; he faces a **maximum of 20 years** in prison. Authorities described Phobos as an affiliate-driven operation in which administrators developed and distributed the ransomware, coordinated sales via a **darknet site**, and advertised services on criminal forums/messaging platforms, while affiliates typically gained access to victim networks—often using **stolen credentials**—to steal and encrypt data and then demand payment for decryption. Reporting also described a fee/revenue model in which affiliates paid administrators for **unique decryption keys** and administrators took a cut of proceeds; Ptitsyn agreed to forfeit **$1.77 million** and pay at least **$39.3 million** in restitution. Additional context in coverage linked Phobos to related activity (including the **8Base** strain) and noted prior law-enforcement actions against other alleged members, as well as the release of a **free Phobos decryption tool** by Japanese authorities.

1 months ago
Poland Arrests Suspected DDoS Operator and Detains Defense Ministry Employee for Espionage

Poland Arrests Suspected DDoS Operator and Detains Defense Ministry Employee for Espionage

Poland’s Central Bureau for Combating Cybercrime (**CBZC**) arrested a 20-year-old suspected of conducting **global DDoS attacks** against high-profile and strategically important websites. Authorities said the suspect used a multi-layered botnet control architecture involving **C2 “stressers”** and **command-and-control nodes (CNC)**, and seized computer equipment allegedly used to host and distribute DDoS tooling; the suspect reportedly confessed to most charges, was released on bail after a formal statement, and faces up to five years in prison if convicted. Separately, Polish authorities detained a 60-year-old civilian employee in the Ministry of National Defense’s strategy and planning department on suspicion of **espionage** for a foreign intelligence service, with Polish officials indicating links to **Russian and Belarusian** services. Counterintelligence searched the suspect’s office and residence and seized phones, computers, and storage media; prosecutors filed espionage charges while officials cited “extensive evidence” and framed the case as part of broader **hybrid warfare** pressure on Poland, including sabotage, disinformation, and cyber activity attributed to Russia-linked actors.

1 months ago
Law Enforcement Disrupts Cybercrime Networks and Arrests Ransomware and Fraud Suspects

Law Enforcement Disrupts Cybercrime Networks and Arrests Ransomware and Fraud Suspects

International and national law enforcement actions were reported targeting a range of cybercrime activity, including ransomware, extortion, and large-scale fraud. SentinelOne summarized multiple cases: Dutch authorities arrested a man accused of attempting to extort officials after receiving sensitive documents by mistake and refusing to delete them; Polish authorities detained a suspect linked to the **Phobos** ransomware-as-a-service ecosystem as part of Europol-coordinated **Operation Aether**, seizing materials such as stolen credentials and access information; and **Operation Red Card 2.0** (coordinated through Interpol/AFJOC) resulted in hundreds of arrests across multiple African countries, along with seizures of devices, takedowns of malicious sites, and recovery of funds tied to investment fraud and mobile-money/loan scams. Separately, Security Affairs’ weekly newsletter highlighted additional ongoing cyber risk items that align with the same broad theme of active cybercrime and enforcement pressure, including an **FBI warning** about a surge in **ATM jackpotting** losses and reporting on **Operation Red Card 2.0**. Other items in the Security Affairs roundup (e.g., additions to CISA’s KEV catalog, vendor/software issues, and various malware reports) were presented as a curated link list rather than a single unified incident. A SOCRadar profile on the China-attributed **Lotus Blossom** espionage group and a Tom’s Hardware historical piece on the first computer search warrant are not part of the law-enforcement disruption story and do not materially support the same specific event narrative.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.