Ethical Hacking News
A Russian national responsible for managing a notorious botnet has been sentenced to two years in prison. The TA551 group was involved in launching ransomware attacks against U.S. companies, resulting in significant financial losses. This conviction marks an important milestone in the ongoing efforts to combat cybercrime globally.
Ilya Angelov, a Russian national, was sentenced to two years in prison and fined $100,000 for his role in managing the TA551 botnet. Angelov oversaw the distribution of malware-infected files attached to spam emails between 2017 and 2021. The TA551 botnet was used to compromise over 72 U.S. corporations and generate more than $14.17 million in extortion payments. The group's tactics included developing programs to distribute spam email, refining malware, and creating a backdoor for easy deployment of ransomware. The partnership between TA551 and other groups highlights the growing complexity and sophistication of ransomware attacks. The case underscores the need for international cooperation in combating cybercrime globally.
The recent sentencing of a Russian national, Ilya Angelov, has brought a measure of justice to victims of ransomware attacks launched by the notorious TA551 botnet. With a total sentence of two years and a fine of $100,000, this conviction marks an important milestone in the ongoing efforts to combat the growing threat of cybercrime.
The U.S. Department of Justice (DoJ) revealed that Angelov, also known by his online aliases "milan" and "okart", was responsible for managing a Russia-based cybercriminal group called TA551 between 2017 and 2021. As part of this role, he oversaw the distribution of malware-infected files attached to spam emails in order to compromise computers, creating a network of infected machines (a botnet) that could be monetized by selling access to individual compromised computers.
The operation was notable for its sophisticated tactics, which included developing programs to distribute spam email and refining malware to bypass security tools. Furthermore, the threat group developed a backdoor through which malicious software could be uploaded to victim's computers, allowing them to easily deploy ransomware.
Angelov worked closely with other members of the TA551 team, as well as external criminal groups that utilized his botnet for their own gain. This included providing access to 72 U.S. corporations between August 2018 and December 2019, resulting in more than $14.17 million in extortion payments. The group also worked with the IcedID malware operators, paying them over a million dollars to acquire access to the botnet.
The extent of the damage caused by TA551 is still unknown, but its partnership with other groups highlights the growing complexity and sophistication of ransomware attacks. This collaboration has been seen in various instances, including the distribution of Conti Ransomware by TrickBot and Lockean ransomware gangs using the services provided by TA551.
This recent conviction underscores the efforts being made to combat cybercrime globally. The U.S. Department of Justice stated that Angelov's actions target American citizens and corporations, highlighting the need for international cooperation in combating these types of threats.
The impact of this case is also evident in the context of other ransomware gangs and their tactics. As law enforcement agencies continue to disrupt and dismantle these groups, new partnerships are being forged between rival organizations.
In light of this development, cybersecurity experts will likely be paying close attention to the evolving landscape of cybercrime and the sophisticated tactics employed by actors such as Ilya Angelov.
Related Information:
https://www.ethicalhackingnews.com/articles/The-Russian-National-Behind-the-TA551-Botnet-Driven-Ransomware-Attacks-Has-Been-Sentenced-to-Two-Years-in-Prison-ehn.shtml
https://thehackernews.com/2026/03/russian-hacker-sentenced-to-2-years-for.html
https://www.bleepingcomputer.com/news/security/russian-man-sentenced-for-operating-botnet-used-in-ransomware-attacks/
https://attack.mitre.org/groups/G0127/
Published: Wed Mar 25 07:51:08 2026 by llama3.2 3B Q4_K_M