Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks
    Cybersecurity

    Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks

    adminBy adminMarch 26, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks
    Share
    Facebook Twitter LinkedIn Pinterest Email

    The Hacker NewsMar 25, 2026Cybercrime / Ransomware

    The U.S. Department of Justice (DoJ) said a Russian national has been sentenced to two years in prison for managing a botnet that was used to launch ransomware attacks against U.S. companies.

    Ilya Angelov, 40, of Tolyatti, Russia, was also fined $100,000. Angelov, who went by the online aliases “milan” and “okart,” is said to have co-managed a Russia-based cybercriminal group known as TA551 (aka ATK236, G0127, Gold Cabin, Hive0106, Mario Kart, Monster Libra, Shathak, and UNC2420) between 2017 and 2021.

    “Angelov’s group built a network of compromised computers (a ‘botnet’) through distribution of malware-infected files attached to spam emails,” the DoJ said. “Angelov and his co-manager then monetized this botnet by selling access to individual compromised computers (‘bots’).”

    According to the sentencing memorandum, the threat group developed programs to distribute spam email and refined malware to bypass security tools. Angelov and his co-manager recruited members and oversaw the various activities. Chief among its tools was a backdoor through which malicious software could be uploaded to the victim’s computers.

    The main goal of the attacks was to resell the access to other criminal groups, who leveraged it for ransomware extortion schemes. Between August 2018 and December 2019, TA551 provided the BitPaymer ransomware group with access to its botnet, allowing the e-crime gang to infect 72 U.S. corporations. This resulted in more than $14.17 million in extortion payments.

    The operators of the IcedID malware also paid Angelov’s group over a million dollars to acquire access to the botnet in late 2019 or early 2020 and distribute ransomware, although the extent of the damage is currently not known. It’s suspected that this partnership blossomed after the disruption of the BitPaymer group. The collaboration lasted until about August 2021, per the U.S. Federal Bureau of Investigation (FBI).

    Based on a report published by Google-owned Mandiant in February 2021, phishing emails containing password-protected archives tricked recipients into opening macro-enabled Microsoft Word documents, leading to the deployment of a macro downloader dubbed MOUSEISLAND. The malware acted as a conduit for a secondary payload, codenamed PHOTOLOADER, which ultimately installed IcedID. Both MOUSEISLAND and PHOTOLOADER have been attributed to TA551.

    In November 2021, Cybereason revealed that the operators of the TrickBot trojan were teaming up with TA551 to distribute Conti Ransomware. That same month, France’s Computer Emergency Response Team (CERT-FR) also disclosed that the Lockean ransomware gang was using distribution services offered by TA551 following the law enforcement takedown of the Emotet botnet at the start of 2021.

    “Foreigner cybercriminals like this defendant target American citizens and corporations,” U.S. Attorney Jerome F. Gorgon Jr. said in a statement. “Their methods grow in sophistication. But their motive remains the same – to rip-off and harm us.”

    The development comes a day after the DoJ announced that another Russian national, a 26-year-old Aleksei Olegovich Volkov (aka “chubaka.kor” and “nets”), was sentenced to nearly 7 years in prison after pleading guilty to acting as an initial access broker (IAB) for Yanluowang ransomware attacks targeting eight companies in the U.S. between July 2021 and November 2022.

    Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.

    attacks BotnetDriven Hacker ransomware Russian Sentenced TA551 years
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleAndroid 17 Beta 2 is no longer a Pixel exclusive (Updated: More phones)
    Next Article You can’t go wrong with these rock-solid earbuds with ANC for just $29
    admin
    • Website

    Related Posts

    Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)

    April 16, 2026

    Cisco says critical Webex Services flaw requires customer action

    April 16, 2026

    NIST Prioritizes NVD Enrichment for CVEs in CISA KEV, Critical Software

    April 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    What Is Answer Engine Optimization? And How to Do It

    April 16, 2026

    Who goes there? Your Ring doorbell can now recognise up to 50 familiar faces, and let you know if a caller is a friend or a stranger

    April 16, 2026

    COSMIC desktop surprised me, because it’s the Linux DE I’ve been waiting for

    April 16, 2026

    Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)

    April 16, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,345)
    • Privacy & Online Earning (168)
    • SEO & Digital Marketing (825)
    • Tech Tools & Mobile / Apps (1,610)
    • WiFi / Internet & Networking (225)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    What Is Answer Engine Optimization? And How to Do It

    April 16, 2026

    Who goes there? Your Ring doorbell can now recognise up to 50 familiar faces, and let you know if a caller is a friend or a stranger

    April 16, 2026

    COSMIC desktop surprised me, because it’s the Linux DE I’ve been waiting for

    April 16, 2026
    Most Popular
    • What Is Answer Engine Optimization? And How to Do It
    • Who goes there? Your Ring doorbell can now recognise up to 50 familiar faces, and let you know if a caller is a friend or a stranger
    • COSMIC desktop surprised me, because it’s the Linux DE I’ve been waiting for
    • Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)
    • Search Ad Growth Slows As Social & Video Gain Faster
    • I’ve been using Android’s built-in focus modes wrong this whole time, and one setting fixed everything
    • Cisco says critical Webex Services flaw requires customer action
    • This one chart exposes how far Pixel has fallen behind in mobile gaming
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.