Fixed Intel
HIGH THREAT ALERT|Threat Actor: TA-551 (also known as Shathak, Gold Cabin, Monster Libra, G0127, ATK236, Mario Kart) - Ilya Angelov
Aggregated Intel
High
Industry NewsImpact: 72/10

Russian Cybercriminal Gets 2-Year Prison Sentence in US 

Ilya Angelov was a member of the cybercrime group tracked as TA-551, Shathak, Gold Cabin, Monster Libra, and ATK236.

FIFixed Intel Team||2 min read|2 Views
Russian Cybercriminal Gets 2-Year Prison Sentence in US 

AI-Generated Summary

Russian cybercriminal Ilya Angelov, operating under aliases 'Milan' and 'Okart', was sentenced to two years in federal prison for administering a botnet used to facilitate ransomware attacks between 2017 and 2021. He was a member of the threat group known as TA-551/Shathak/Gold Cabin, which distributed malware including Emotet, IcedID, Qbot, and Ursnif via spam email attachments and sold botnet access to ransomware operators. The operation targeted over 70 US corporations, generating approximately $14 million in ransom payments, resulting in a $100,000 fine and $1.6 million money judgment in addition to his prison sentence.

Threat Actor

TA-551 (also known as Shathak, Gold Cabin, Monster Libra, G0127, ATK236, Mario Kart) - Ilya Angelov

Affected Sectors

FinanceHealthcareGovernmentTechnologyManufacturingCritical Infrastructure

Frameworks

NIST CSFISO27001NIST SP 800-53CIS ControlsNCA-ECC

Aggregated from SecurityWeek

This article was automatically aggregated from an external source. Content may be summarized.

Read Original

Full Analysis

Russian cybercriminal Ilya Angelov, known online as ‘Milan’ and ‘Okart’, has been sentenced to two years in federal prison for his role in the administration of a botnet used to facilitate ransomware attacks, the DOJ announced on Tuesday.

According to the DOJ, Angelov was part of a threat group tracked by the FBI as Mario Kart, and by the cybersecurity community as TA-551, Shathak, Gold Cabin, Monster Libra, G0127, and ATK236.

The charges against Angelov stem from activities he engaged in between 2017 and 2021, during which his cybercrime group built a botnet by distributing malware via spam email attachments. 

They monetized the compromised machines by selling access for deploying ransomware. 

TA-551 was known to distribute malware such as Emotet, IcedID, Qbot, and Ursnif.

The DOJ has mentioned ransomware attacks facilitated by the botnet against more than 70 US corporations, with the cybercriminals earning $14 million in ransom payments. 

Advertisement. Scroll to continue reading.

Court documents show Angelov has been in custody since 2023 and has pleaded guilty to his role in the cybercrime operation.

In addition to the 24-month prison sentence, he received a $100,000 fine and a $1.6 million money judgment, allowing the government to seize assets tied to his criminal proceeds.

Angelov’s sentencing comes shortly after the DOJ announced that another Russian national, Aleksei Volkov, has been sentenced to 81 months in prison for his role in ransomware attacks. 

Related: Russian Ransomware Operator Pleads Guilty in US

Related: Russian APT Exploits Zimbra Vulnerability Against Ukraine

Related: US Sanctions Russian Exploit Broker Operation Zero


Originally published by SecurityWeek

Original Source

SecurityWeek