Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Botnet operator behind $14 million in ransomware extortion payments gets 24 months behind bars
    Cybersecurity

    Botnet operator behind $14 million in ransomware extortion payments gets 24 months behind bars

    adminBy adminMarch 25, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Botnet operator behind $14 million in ransomware extortion payments gets 24 months behind bars
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A Russian national has been sentenced to 24 months in prison after admitting he managed a botnet used to launch ransomware attacks against dozens of U.S. companies. The judge also imposed a $100,000 fine and ordered him to forfeit $1.6 million linked to the scheme.

    russian botnet operator sentenced

    Court records show that from 2017 to 2021, Ilya Angelov, 40, of Tolyatti, Russia, who used the aliases “milan” and “okart,” co-managed a Russia-based cybercrime group tracked by the FBI as Mario Kart. Private security researchers also refer to the group as TA-551, Shathak, GOLD CABIN, Monster Libra, ATK236, and G0127.

    Angelov’s group built a botnet by distributing malware-infected files in spam email attachments, then monetized it by selling access to individual infected computers.

    Using a campaign capable of sending up to 700,000 messages a day, the group spread malware worldwide, infecting users who opened malicious attachments and adding their systems to the Mario Kart botnet. At its peak, the operation infected up to 3,000 computers per day.

    “This access was sold to other criminal groups, which typically engaged in ransomware extortion schemes, locking victims out of their computer networks and demanding extortion payments, commonly in cryptocurrency, to restore access,” prosecutors said.

    According to the FBI, more than 70 U.S. companies were hit with ransomware by a group tied to Angelov’s operation, leading to over $14 million in extortion payments. One ransomware group paid Angelov’s group over $1 million for access to the Mario Kart botnet.

    “Foreigner cybercriminals like this defendant target American citizens and corporations. Their methods grow in sophistication. But their motive remains the same — to rip-off and harm us,” said U.S. Attorney Gorgon.

    An interesting detail is that Angelov voluntarily traveled to the United States to face charges and accept responsibility for his role in running the Mario Kart group.

    bars Botnet extortion Million months Operator Payments ransomware
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleA playbook for machine-readable content
    Next Article 46 Must-Know YouTube Statistics [Infographic]
    admin
    • Website

    Related Posts

    Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)

    April 16, 2026

    Cisco says critical Webex Services flaw requires customer action

    April 16, 2026

    NIST Prioritizes NVD Enrichment for CVEs in CISA KEV, Critical Software

    April 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    COSMIC desktop surprised me, because it’s the Linux DE I’ve been waiting for

    April 16, 2026

    Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)

    April 16, 2026

    Search Ad Growth Slows As Social & Video Gain Faster

    April 16, 2026

    I’ve been using Android’s built-in focus modes wrong this whole time, and one setting fixed everything

    April 16, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,345)
    • Privacy & Online Earning (168)
    • SEO & Digital Marketing (824)
    • Tech Tools & Mobile / Apps (1,609)
    • WiFi / Internet & Networking (225)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    COSMIC desktop surprised me, because it’s the Linux DE I’ve been waiting for

    April 16, 2026

    Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)

    April 16, 2026

    Search Ad Growth Slows As Social & Video Gain Faster

    April 16, 2026
    Most Popular
    • COSMIC desktop surprised me, because it’s the Linux DE I’ve been waiting for
    • Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)
    • Search Ad Growth Slows As Social & Video Gain Faster
    • I’ve been using Android’s built-in focus modes wrong this whole time, and one setting fixed everything
    • Cisco says critical Webex Services flaw requires customer action
    • This one chart exposes how far Pixel has fallen behind in mobile gaming
    • NIST Prioritizes NVD Enrichment for CVEs in CISA KEV, Critical Software
    • Google AI director outlines new content playbook
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.