Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Popular Python Package ‘lightning’ Hacked in Supply Chain
April 30, 2026
FBI & CISA Release Zero Trust Guide for Released Principles
April 30, 2026
Google Gemini CLI Flaws Allow Remote Code Execution on Hosts
April 30, 2026
Home/Breaches/Conti Ransomware Gang Leaders & Infrastructure Exposed
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

Emy Elsamnoudy
Emy Elsamnoudy
January 1, 2026 One Min Read
22 0

Ransomware Gang Leaders & Infrastructure Exposed

Okay, so here’s some seriously big news in the cybercrime world. An anonymous investigator, who goes by ‘GangExposed,’ just landed a massive, devastating blow against the infamous Conti ransomware group. This wasn’t just any hit, either; it was a landmark investigation that exposed the real identities of key figures, spilled their operational strategies, and even tracked their global movements. Pretty wild, right?

Table Of Content

  • Conti Ransomware Group and Key Actors
  • Unmasking “Professor”: Vladimir Viktorovich Kvitko
  • The Dubai Hub: Conti’s Autumn 2021 Offensive
  • Target: The $10 Million Predator
  • Arkady Bondarenko: The Conti Negotiator
  • Andrey Zhuykov: The Technical Backbone
  • Other Key Figures
  • Leaked Data: A Goldmine for Investigators

Through meticulous analysis of leaked communications, travel records, financial data, and public records, GangExposed has unmasked core leaders including Vladimir Viktorovich Kvitko (“Professor”), the elusive mastermind “Target,” negotiator Arkady Valentinovich Bondarenko, and system administrator Andrey Yuryevich Zhuykov (“Defender”).

This exclusive report delves into the syndicate’s Dubai-based operations, its attacks on hospitals during the COVID-19 pandemic, and the critical infrastructure sustaining its global cybercrime empire, offering law enforcement a rare opportunity to dismantle one of the world’s most dangerous ransomware networks.

A short announcement. pic.twitter.com/fHD3MJ7KwF

— GangExposed (@GangExposed) May 29, 2025

The U.S. Department of State’s Rewards for Justice (RFJ) program has announced a reward of up to $10 million for information leading to the identification or location of individuals involved in malicious cyber activities against U.S. critical infrastructure, in violation of the Computer Fraud and Abuse Act (CFAA).

The initiative specifically targets members of the Conti ransomware group, a Russian government-linked ransomware-as-a-service (RaaS) operation known for attacking vital U.S. and Western infrastructure.

🎁CONTI LEAK: Video they tried to bury!
6+ Conti members on a private jet. TARGET’s birthday — $10M bounty on his head.

Filmed by TARGET himself. Original erased — we kept a copy.

🎥Watch and help identify him!@LawrenceAbrams @pancak3lullz @c3rb3ru5d3d53c#CyberCrime #Leak… pic.twitter.com/8eLZaFlW5F

— GangExposed (@GangExposed) May 6, 2025

Conti Ransomware Group and Key Actors

The RFJ program is seeking information on malicious cyber actors operating under the aliases “Target,” “Reshaev,” “Professor,” “Tramp,” and “Dandis,” believed to be associated with Conti, also known as Wizard Spider.

First detected in 2019, Conti has conducted over 1,000 ransomware operations, targeting critical infrastructure sectors including law enforcement agencies, emergency medical services, 9-1-1 dispatch centers, and municipalities.

Of the more than 400 organizations worldwide victimized by Conti, over 290 are located in the United States.

Here are photos of 12 individuals, and here is their list:

ABDULLAEV ILGAR OGLY 25.06.1972
ANDREEV FIODOR ALEKSANDROVICH 05.09.1986
VASILCHENKO ALEKSANDR MIKHAILOVICH 20.12.1991
GALOCHKIN MAXIM SERGUEEVICH 19.05.1982
ZHUIKOV ANDREI YOURIEVICH 18.02.1982
ZHUKOV ALEKSANDR…

— GangExposed (@GangExposed) May 30, 2025

🎉 How do the new generation of ransomware kingpins celebrate?

In this exposé, meet the so-called “golden boys” of cybercrime — key figures from Royal, BlackSuit, Conti, and Trickbot. Think luxury parties, private jets, and blatant impunity — all funded by global extortion… pic.twitter.com/bq2HS9x8ah

— club1337 (@club31337) May 12, 2025

Unmasking “Professor”: Vladimir Viktorovich Kvitko

GangExposed has conclusively identified “Professor,” a core Conti leader, as Vladimir Viktorovich Kvitko (born October 23, 1984), a Russian national who relocated from Moscow to Dubai in autumn 2020.

💥EXPOSED: We uncovered the Professor behind Conti Ransomware! Dossier, flights, docs, leaks.

🔗Full evidence here: https://t.co/ESFOLAiUTC

💰 $10M bounty on the line — and we’re burning another $10M to take them down. Share now! #Conti #Trickbot #Cybersecurity pic.twitter.com/9TqY7xGwsd

— GangExposed (@GangExposed) May 7, 2025

Kvitko’s role in Conti involves orchestrating real-world carding schemes, leveraging weak banking systems in countries like India, Cuba, and Iran.

His identity was confirmed through synchronized travel patterns and chat inactivity: Russian records show Kvitko in the Altai Republic from June 15–17, 2021, matching periods when “Professor” was silent in Conti’s Jabber chats, resuming communication upon his return to Moscow on June 18.

FSB border data further document his frequent trips to the UAE, Cuba, Iran, Austria, and Turkey, aligning with Conti’s operations. Since August 2022, Kvitko has remained in Dubai, managing visa extensions via trips to the Netherlands and Austria.

His dossier, including passports, phone numbers, emails, social media profiles, and property records tied to income from RM RAIL Management Company and Rosselkhozbank, is part of GangExposed’s digital archive Mega link.

The Dubai Hub: Conti’s Autumn 2021 Offensive

In autumn 2021, Conti transformed Dubai into a strategic hub for a massive wave of ransomware attacks targeting Western, Middle Eastern, and Chinese companies.

Led by “Target,” a figure with a $10 million FBI bounty, the group operated from physical offices equipped with dedicated attack infrastructure, coordinated by system administrator Andrey Zhuykov and involving negotiator Arkady Bondarenko.

Andrey Yuryevich Zhuykov 18.02.1982
Aliases: Defender, Dif

🔗Dossier: https://t.co/J5wiCVd4jl

System Administrator of the Conti.
Defender is a key technical specialist responsible for the viability of the group’s entire infrastructure.#Conti #Cybercrime #Ransomware pic.twitter.com/6cBBJZDMsg

— GangExposed (@GangExposed) May 30, 2025

The operation’s timeline reveals meticulous planning:

  • On October 1, 2021, leaked chats reference a “negotiator” described as a “Canadian from a recovery company,” identified as Bondarenko, who flew from Dubai to Moscow that day (flight EK-133), discussing payment issues via the Suex exchange. This coincided with Conti’s attack preparations.
  • By October 2, “Target” coordinated the setup of a Dubai office, ordering equipment and collaborating with deputy Sergey Khitrov.
  • Between October 10–14, key members, including Marat Nurtdinov, Oleg Fakeev, Kvitko, and Elizaveta Suchkova, arrived in Dubai via flights SU-520 and G9-956.
  • From October 17 to November 6, Conti executed peak attacks: 7 on October 17 (e.g., Graff Diamonds, JVCKenwood), 11 on October 23 (e.g., Obeikan Investment Group in the UAE), and 13 on November 6, including ARM China and TRINA SOLAR (UAE).

These attacks exploited the UAE’s lack of extradition agreements and lax cybercrime oversight, targeting not only Western firms but also local and Asian companies, with Bondarenko managing victim negotiations and Zhuykov ensuring the technical infrastructure’s stability.

Target: The $10 Million Predator

“Target,” operating under aliases like “Bloodrush” and “Red,” is Conti’s disciplined and ruthless leader, commanding a near-corporate criminal enterprise with nearly 100 operatives.

Despite a $10 million FBI bounty, he has evaded capture for three years, boasting ties to Russia’s FSB and amassing millions in Bitcoin while paying operatives $200 weekly.

His chilling disregard for human suffering was evident during the COVID-19 pandemic, when he targeted 428 U.S. hospitals in October 2020, gloating in chats: “428 hospitals… I’m satisfied” and “make them die or pay up.”

Target’s offline offices, strict employee oversight, and erasure of digital traces via platforms like Jabber and RocketChat highlight his operational sophistication.

GangExposed recovered deleted messages through metadata and quotes, exposing his schemes, including the Dubai hub’s establishment.

Arkady Bondarenko: The Conti Negotiator

Arkady Valentinovich Bondarenko (born August 2, 1970), a dual Russian-Canadian citizen, is identified as Conti’s key negotiator, managing victim communications and ransom payments.

🚨 New Investigation: Bondarenko Arkady — Negotiator for the Conti Group.

🔗Details, analysis, and Dossier: https://t.co/3f66u6EM25#Conti #Cybercrime #Ransomware pic.twitter.com/YGnxJcvGmx

— GangExposed (@GangExposed) May 24, 2025

On October 1, 2021, Conti member “Mango” described him as a “Canadian from a recovery company” in chats, aligning with his departure from Dubai to Moscow (flight EK-133).

His travel frequently overlapped with Kvitko’s, notably on January 17, 2020 (Kvitko on SU-522, Bondarenko on EK-134), May 2022, and February 2019, suggesting in-person coordination while avoiding shared flights.

Bondarenko’s financial profile, with over 107 million RUB from VTB Bank and ownership of luxury Moscow properties, premium vehicles (e.g., Infiniti QX80), and shell companies like LLC “Jewelry House Millennium,” indicates money laundering activities.

His dossier details multiple phones (e.g., +7 926 686-00-00), emails (e.g., [email protected]), and bank accounts, confirming his role as a financial intermediary.

Andrey Zhuykov: The Technical Backbone

Andrey Yuryevich Zhuykov (born February 18, 1982), known as “Defender” or “Def,” is Conti’s principal system administrator and DevOps specialist, responsible for the group’s technical infrastructure.

Operating from Russia’s Sverdlovsk Region and Sochi, Zhuykov manages servers, domains, proxies, VPNs, control panels, and backup channels, ensuring the stability and anonymity of Conti’s operations.

His high technical competence and strict management style make him a critical “single point of failure” for the group.

Leaked chats show him coordinating with leadership (e.g., Stern, Buza), suppliers, and coders, handling payments for servers and licenses, and conducting security audits to prevent vulnerabilities.

His dossier includes passports (e.g., 6511090337), phones (e.g., +7 989 165 9356), emails (e.g., [email protected]), and social profiles (e.g., Telegram@nohau).

Zhuykov’s financial struggles, with debts exceeding 2 million RUB and enforcement cases for child support, contrast with his critical role in Conti’s multimillion-dollar operations.

Other Key Figures

Additional Conti leaders exposed include:

Vitaly Kovalev (“Stern”), whose leaked Telegram messages (@tguser1) reveal network connections. Despite plastic surgery to alter his appearance, GangExposed exposed his new face and passports.

🚨 New Investigation: Bondarenko Arkady — Negotiator for the Conti Group.

🔗Details, analysis, and Dossier: https://t.co/3f66u6EM25#Conti #Cybercrime #Ransomware pic.twitter.com/YGnxJcvGmx

— GangExposed (@GangExposed) May 24, 2025

Mikhail Mikhailovich Tsaryov (“Mango”), born April 20, 1989, a coordinator in the Conti-TrickBot ecosystem who referenced Bondarenko’s negotiator role link.

Tsaryov Mikhail Mikhailovich 20.04.1989
Aliases: Mango

🔗Dossier: https://t.co/CGC35hwYaQ

Mango is a key coordinator and the “grey cardinal” within the Conti/TrickBot ecosystem.#Conti #Cybercrime #Ransomware pic.twitter.com/kbeRpBl1jG

— GangExposed (@GangExposed) May 29, 2025

Leaked Data: A Goldmine for Investigators

GangExposed’s unprecedented data release includes Conti Jabber and RocketChat leaks, Black Basta Matrix-Chat leaks, and Telegram messages from Kovalev, available in table and CSV formats.

These datasets detail internal communications, including Bondarenko’s negotiations and Zhuykov’s infrastructure management, enabling investigators to map Conti’s structure, track financial flows, and identify remaining figures. Recovered deleted chats reveal attempts to erase evidence of the Dubai hub, hospital attacks, and financial operations.

When GangExposed leaked Conti’s secrets, the group offered $4 million for a Telegram exploit to retaliate, as reported by Habr. This failed attempt underscores their desperation to silence the investigator, who noted, “I poked the hornet’s nest,” promising further revelations about Target’s identity.

The exposure of Conti’s Dubai hub, coupled with dossiers on Kvitko, Bondarenko, Zhuykov, and others, provides actionable intelligence for UAE authorities to investigate local victims like Obeikan Investment Group and TRINA SOLAR, and for Chinese authorities to probe ARM China’s breach.

Western agencies can leverage the $10 million bounty on Target, while Bondarenko’s dual citizenship and Zhuykov’s financial trails offer avenues for international cooperation to seize illicit funds.

GangExposed’s relentless investigation has shattered Conti’s anonymity, unmasking Kvitko as “Professor,” Bondarenko as the negotiator, Zhuykov as the technical backbone, and detailing Target’s hospital attacks and Dubai operations. With comprehensive dossiers and leaked data, this breakthrough offers law enforcement and victims a historic chance to dismantle a global cybercrime syndicate.

Tags:

AptAttackBitcoinBreachCybersecurityExploitPatchransomwareSecurity

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

MongoBleed Detector Tool Detects Critical MongoDB CVE-

Next Post

Top 10 High-Risk Vulnerabilities Exploited in Wild

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
OpenAI’s 5-Point Plan to Strengthen AI Releases Action
April 30, 2026
CVE MCP Server: Claude Becomes a Security Analyst with
April 30, 2026
Claude Commit Infects Crypto Trading Agent with PromptMink Malware
April 30, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us