Ethical Hacking News
Four members of the notorious REvil ransomware group have been released from custody in Russia despite pleading guilty to fraud and malware distribution charges. The decision raises questions about the country's approach to handling individual cases amidst a broader context of cooperation with international partners in the fight against cybercrime.
Russia has released four members of the REvil ransomware group from custody despite pleading guilty to fraud and malware distribution charges. The four group members were involved in REvil activities between October 2015 and January 2022, primarily targeting US citizens. The release comes amidst a broader trend of Russian authorities addressing the country's notorious cybercrime problem. Extradition agreements with the US are unclear, as there is currently no indication that any of those arrested will be extradited to the US. The decision may be seen as a pragmatic step by authorities in handling individual cases and navigating complex international relationships.
Russia, known for its authoritarian government and reputation for ruthlessness in combating cybercrime, has recently released four members of the notorious REvil ransomware group from custody despite pleading guilty to fraud and malware distribution charges. This decision, made by the Dzerzhinsky Court of St. Petersburg on Monday, may have raised eyebrows among cybersecurity experts and law enforcement officials worldwide, who were watching this case closely for its implications.
According to Russian state-owned news agency TASS, the four REvil members - Roman Muromsky, Andrei Bessonov, Mikhail Golovachuk, and Dmitry Korotaev - confirmed that they had been involved in REvil activities between October 2015 and January 2022. During this period, they primarily targeted US citizens, employing tactics such as "carding," a form of fraud and laundering involving the use of stolen credit card information to purchase prepaid gift cards.
The court ordered Bessonov to surrender two 2020 BMWs, while Korotaev was also forced to hand over a 2019 Mercedes-Benz C200. In addition, the sentencing included an order for more than $1 million (in rubles and US dollars) to be seized from Korotaev's assets. The case is unrelated to REvil's prolific and high-profile ransomware attacks before it was dismantled in 2021.
The release of these four members comes amidst a broader trend of Russian authorities taking steps to address the country's notorious cybercrime problem. In January 2022, Russian authorities made significant arrests, including the detention of 14 REvil members. Some of those arrested received prison sentences ranging from up to six and a half years.
While the release of Muromsky, Bessonov, Golovachuk, and Korotaev may seem counterintuitive given their guilty plea, there appears to have been an exception made in their favor due to time served. Specifically, Russian authorities acknowledged that the four group members had spent enough time in detention centers while awaiting trial.
It is worth noting that this decision does not imply that Russia's stance on cybercrime has become less stringent or cooperative with international efforts to combat this issue. Rather, it may be seen as a pragmatic step taken by authorities in handling individual cases and taking into account the complexities of the justice system in Russia.
The release of these four members also highlights ongoing debates surrounding extradition agreements between countries. Specifically, there is currently no indication that any of those arrested will be extradited to the United States.
As this case continues to unfold and its implications become clearer, it serves as a reminder of the intricate challenges involved in navigating complex international relationships and efforts aimed at combating cybercrime.
Related Information:
https://www.ethicalhackingnews.com/articles/Russias-Relentless-Pursuit-of-Cybercrime-The-Case-of-REvil-Ransomware-Group-ehn.shtml
https://www.theverge.com/news/692582/russia-revil-hacker-group-ransomware-sentencing
Published: Wed Jun 25 10:39:39 2025 by llama3.2 3B Q4_K_M