Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The state of DevOps and AI: Not just hype

      September 1, 2025

      A Breeze Of Inspiration In September (2025 Wallpapers Edition)

      August 31, 2025

      10 Top Generative AI Development Companies for Enterprise Node.js Projects

      August 30, 2025

      Prompting Is A Design Act: How To Brief, Guide And Iterate With AI

      August 29, 2025

      Look out, Meta Ray-Bans! These AI glasses just raised over $1M in pre-orders in 3 days

      September 2, 2025

      Samsung ‘Galaxy Glasses’ powered by Android XR are reportedly on track to be unveiled this month

      September 2, 2025

      The M4 iPad Pro is discounted $100 as a last-minute Labor Day deal

      September 2, 2025

      Distribution Release: Linux From Scratch 12.4

      September 1, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Enhanced Queue Job Control with Laravel’s ThrottlesExceptions failWhen() Method

      September 2, 2025
      Recent

      Enhanced Queue Job Control with Laravel’s ThrottlesExceptions failWhen() Method

      September 2, 2025

      August report 2025

      September 2, 2025

      Fake News Detection using Python Machine Learning (ML)

      September 1, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Installing Proxmox on a Raspberry Pi to run Virtual Machines on it

      September 2, 2025
      Recent

      Installing Proxmox on a Raspberry Pi to run Virtual Machines on it

      September 2, 2025

      Download Transcribe! for Windows

      September 1, 2025

      Microsoft Fixes CertificateServicesClient (CertEnroll) Error in Windows 11

      September 1, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»DOJ Presses $15M Extortion Charges Against Alleged Ryuk Ransomware Gang Member

    DOJ Presses $15M Extortion Charges Against Alleged Ryuk Ransomware Gang Member

    July 17, 2025

    Ryuk Ransomware, Ryuk, Ransomware, US, Ukraine, Ransomware Gang, Department of Justice, DOJ

    The United States Department of Justice has pushed charges against a suspected Ryuk ransomware operator extradited from Ukraine, last month, for carrying out a $15 million “ransomware extortion conspiracy.” The gang targeted thousands of victims worldwide, including an Oregon-based tech company.

    Karen Serobovich Vardanyan, a 33-year-old Armenian national, was extradited from Ukraine on June 18, to face federal charges in the U.S. for orchestrating high-impact Ryuk ransomware attacks between March 2019 and September 2020.

    The DOJ unsealed charges on July 16, stating that Vardanyan conspired to deploy Ryuk—a malware strain notorious for encrypting corporate networks and demanding ransoms in Bitcoin—from hundreds of compromised servers and workstations. As per Ukraine’s Office of the Prosecutor General, Ryuk ransomware gang members were responsible for more than 2,400 cyberattacks around the globe, which helped them extort an upward of $100 million.

    The 33-year-old likely acted as an initial access broker (IAB) and “was engaged in searching for vulnerabilities in the corporate networks of the victim companies,” the Ukrainian police authorities said, at the time of the extradition announcement. “The data obtained by the hacker was used by his accomplices to plan and carry out cyberattacks.”

    Court documents reveal that Vardanyan and co-conspirators—including an Armenian associate in France, Levon Georgiyovych Avetisyan and two Ukrainians, Oleg Lyulyava and Andrii Prykhodchenko—targeted a wide range of entities, spanning private businesses, municipalities, school districts, critical infrastructure operators, and hospitals. They employed Ryuk ransomware to paralyze systems, lock users out, and issue ransom demands in Bitcoin.

    Reports indicate that this operation amassed approximately 1,610 Bitcoins, valued at over $15 million at the time.

    Also read: How the NCA Cracked Billion-Dollar Money Laundering Rings Linked to Ransomware Gangs

    Vardanyan pleaded not guilty to charges of conspiracy, fraud in connection with computers, and extortion related to ransomware use. The DOJ has set his seven-day jury trial to begin on August 26. If convicted, he faces a maximum sentence of five years in federal prison, three years’ supervised release, and a fine of $250,000 for each count.

    As the FBI continues to lead the investigation and hunt for the gang’s affiliates, Vardanyan’s co-defendant Avetisyan faces a similar extradition request in France, while Lyulyava and Prykhodchenko remain at large.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleFixing the Common jQuery Error in WP
    Next Article Smashing Security podcast #426: Choo Choo Choose to ignore the vulnerability

    Related Posts

    Development

    Enhanced Queue Job Control with Laravel’s ThrottlesExceptions failWhen() Method

    September 2, 2025
    Artificial Intelligence

    Scaling Up Reinforcement Learning for Traffic Smoothing: A 100-AV Highway Deployment

    September 2, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    OrbVis is a Realtime Satellite Orbit Visualizer

    Linux

    ‘Incoming sub model!’ — PC gamers react to Nexus Mods ownership change

    News & Updates

    CVE-2025-40621 – TCMAN GIM SQL Injection

    Common Vulnerabilities and Exposures (CVEs)

    OpenAI shut down the Ghibli craze – now users are turning to open source

    Artificial Intelligence

    Highlights

    CVE-2025-8142 – Soledad Theme for WordPress Local File Inclusion Vulnerability

    August 16, 2025

    CVE ID : CVE-2025-8142

    Published : Aug. 16, 2025, 12:15 p.m. | 13 hours, 54 minutes ago

    Description : The Soledad theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 8.6.7 via the ‘header_layout’ parameter. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.

    Severity: 8.8 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Under the hood: Exploring the AI models powering GitHub Copilot

    August 29, 2025

    Three.js: The Future of 3D Web Development

    May 13, 2025

    CVE-2025-6468 – Code-projects Online Bidding System SQL Injection Vulnerability

    June 22, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.