Prolific Russian Ransomware Member Sentenced to Group Months
A Latvian national, operating out of Moscow, has been sentenced to 102 months in federal prison. The conviction stems from his central role in a sprawling Russian ransomware syndicate. Deniss...
A Latvian national, operating out of Moscow, has been sentenced to 102 months in federal prison. The conviction stems from his central role in a sprawling Russian ransomware syndicate.
Deniss Zolotarjovs, 35, served as a primary extortionist and negotiator for a highly organized cybercriminal network that attacked over 54 companies worldwide.
The United States Justice Department announced the sentencing, highlighting the extensive international collaboration required to dismantle parts of the ransomware ecosystem.
Zolotarjovs was a key player in an operation led by former members of the notorious Conti ransomware group.
Between June 2021 and August 2023, the syndicate operated under several prominent ransomware brands, including Conti, Karakurt, Royal, TommyLeaks, SchoolBoys Ransomware, and Akira.
Russian Ransomware Member Sentenced to Prison
The group maintained a sophisticated, hierarchical management structure based in an office building in St. Petersburg, Russia.
To obfuscate their illicit operations, the syndicate utilized a complex network of front companies registered across Russia, Europe, and the United States.
As a negotiator, Zolotarjov specifically escalated pressure on victims who refused to pay initial ransom demands.
He conducted in-depth research on compromised organizations and meticulously analyzed stolen data to maximize his leverage.
His extortion tactics were notably aggressive. During an attack on a pediatric healthcare provider, Zolotarjovs deliberately weaponized the medical records of children.
When the company refused to pay, he instructed his co-conspirators to leak the sensitive information to create panic.
In a calculated move to sow fear among future victims, he distributed a massive data pack to hundreds of individual patients, exposing deeply personal healthcare details instead of sending tailored files to individual victims.
According to the U.S. Department of Justice press release, attacks on just 13 of 54 victims caused over $56 million in losses and $2.8 million in ransom payments.
An additional 41 companies paid out roughly $13 million during the same period.
Federal authorities estimate that total financial damages tied to his involvement likely exceed $100 million. Beyond financial extortion, the group’s reckless operations placed lives at risk.
The syndicate successfully forced a government entity’s 911 emergency system offline. It exposed thousands of Social Security numbers, dates of birth, and home addresses.
The syndicate’s operations were deeply embedded in systemic corruption.
The group utilized former Russian law enforcement officers to co-opt government databases. It paid frequent bribes to exempt draft-age members from compulsory military service.
Despite these protections, international law enforcement successfully tracked Zolotarjovs.
He was arrested in Georgia in December 2023 and extradited to U.S. custody in August 2024.
After pleading guilty in July 2025 to conspiracy to commit money laundering and wire fraud, his sentencing marks a significant victory for global cybersecurity enforcement efforts led by the FBI.
Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.



No Comment! Be the first one.