Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

February 7, 2026

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
Facebook X (Twitter) Instagram
Sunday, February 8
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted
News

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

Team-CWDBy Team-CWDSeptember 11, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A 28-year-old Ukrainian has been added to a list of Europe’s most wanted fugitives for alleged participation in LockerGoga ransomware attacks.

Volodymyr Tymoshchuk is said to have deployed the ransomware against hundreds of victim companies between 2018 and 2020, causing more than $18bn in damages worldwide.

Most notably, he is being pegged for the 2019 attack on Norwegian aluminium giant, Norsk Hydro, which the company estimated cost it NOK 300-350 million (£26-40m, $35-41m at the time) in the first week alone.

Europol said that Tymoshchuk’s unmasking had come after a lengthy, complex and coordinated operation involving law enforcement France, Germany, the Netherlands, Norway, Switzerland, Ukraine, the UK and the US, together with Europol and Eurojust.

Read more on LockerGoga: Euro Police Swoop on 12 Suspected Ransomware Gang Members

After previous arrests, investigators were able to map the structure of the group and the identities of various members – including malware developers, intrusion specialists and money launderers, Europol claimed. Five individuals were arrested in April this year in connection with the LockerGoga, MegaCortex, Hive and Dharma ransomware variants.

US Offers $11m as Net Tightens

The policing group’s announcement follows the unsealing in the US of a superseding indictment charging Tymoshchuk (aka deadforz, Boba, msfv and farnetwork) with serving as an administrator for not only LockerGoga, but also the MegaCortex and Nefilim ransomware groups.

“Volodymyr Tymoshchuk is charged for his role in ransomware schemes that extorted more than 250 companies across the United States and hundreds more around the world,” said acting assistant attorney general Matthew Galeotti of the Justice Department’s Criminal Division.

“In some instances, these attacks resulted in the complete disruption of business operations until encrypted data could be recovered or restored. This prosecution and today’s rewards announcement reflects our determination to protect businesses from digital sabotage and extortion and to relentlessly pursue the criminals responsible, no matter where they are located.”

The State Department’s Transnational Organized Crime (TOC) Rewards Program is offering rewards totaling $11m for information leading to the arrest and/or conviction or location of Tymoshchuk or his conspirators.

He is charged with two counts of conspiracy to commit fraud and related activity in connection with computers, three counts of intentional damage to a protected computer, one count of unauthorized access to a protected computer and one count of transmitting a threat to disclose confidential information.

LockerGoga/MegaCortex efforts were not always successful. In 2022, Europol and Bitdefender released a decryptor for LockerGoga, enabling many victims to regain access to their data.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleFrance: Three Regional Healthcare Agencies Targeted by Cyber-Attacks
Next Article LNER Reveals Supply Chain Attack Compromised Customer Information
Team-CWD
  • Website

Related Posts

News

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

February 7, 2026
News

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026
News

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Can password managers get hacked? Here’s what to know

November 14, 2025

Chronology of a Skype attack

February 5, 2026

Drowning in spam or scam emails lately? Here’s why

January 27, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.