Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026

Here’s what you should know

February 6, 2026
Facebook X (Twitter) Instagram
Friday, February 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Nefilim Ransomware Affiliate Pleads Guilty
News

Nefilim Ransomware Affiliate Pleads Guilty

Team-CWDBy Team-CWDDecember 22, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A Ukrainian national has pleaded guilty to using Nefilim ransomware against a number of corporate victims in the US and elsewhere.

Artem Aleksandrovych Stryzhak, 35, was extradited from the Spanish city of Barcelona earlier this year after being arrested in June 2024. He pleaded guilty to one count of conspiracy to commit computer fraud, according to the US Justice Department (DoJ).

Stryzhak became a Nefilim affiliate in June 2021, after he was given an account by the ransomware-as-a-service administrators in exchange for 20% of his proceeds.

Having been encouraged to target companies with $200m+ in annual revenue, Stryzhak and his co-conspirators used online databases like Zoominfo to research and select their victims.

Organizations in the US, Canada and Australia were preferred, with Nefilim working like many variants. The threat actors would compromise networks, steal data and then encrypt it. Victims were told to pay a ransom in exchange for the decryption key, or else have their stolen data published to a “corporate leaks” site maintained by the ransomware developers.

Read more on Nefilim: Cyber Agencies Warn of Fast Flux Threat Bypassing Network Defenses

It’s unclear how Stryzhak was apprehended but the DoJ explained that, shortly after becoming a Nefilim affiliate, he asked a co‑conspirator whether he should choose a different username to the one he used in other criminal activity, in case the panel “gets hacked into by the feds.”

Nefilim has subsequently been rebranded as Fusion, Milihpen, Gangbang, Nemty and Karma, among other names.

Stryzhak is facing a maximum of 10 years behind bars and will be sentenced in May 2026.

Conspirators at Large

The guilty plea still leaves at least one of Stryzhak’s co-conspirators at large.

Volodymyr Tymoshchuk (aka deadforz, Boba, msfv and farnetwork), a 28-year-old also from Ukraine, was recently added to a list of Europe’s most wanted fugitives after being linked to LockerGoga, MegaCortex and Nefilim. He’s believed to have been the administrator of these ransomware groups.

The US Department of State’s Transnational Organized Crime (TOC) Rewards Program has offered a reward of up to $11m for information leading to his location, arrest and/or conviction.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNew Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
Next Article Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads
Team-CWD
  • Website

Related Posts

News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
News

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
News

Chinese-Made Malware Kit Targets Chinese-Based Edge Devices

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What if your romantic AI chatbot can’t keep a secret?

November 18, 2025

Here’s what you should know

February 6, 2026

Why the tech industry needs to stand firm on preserving end-to-end encryption

September 12, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.