Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Conti Group Member Responsible for Deploying Ransomware Extradited to USA

Posted on November 3, 2025November 3, 2025 By CWS

A Ukrainian nationwide accused of enjoying a key function within the infamous Conti ransomware operation has been extradited from Eire to face federal costs in america.

Oleksii Oleksiyovych Lytvynenko, 43, made his first court docket look within the Center District of Tennessee following his switch from Irish custody, the place he had been held since July 2023.

In keeping with court docket paperwork, Lytvynenko allegedly conspired with different cybercriminals between 2020 and June 2022 to deploy Conti ransomware in opposition to victims worldwide.

The operation concerned hacking into pc networks, encrypting knowledge, and demanding ransom funds in cryptocurrency to revive entry and forestall public disclosure of stolen data.

Conti Ransomware Focusing on Essential Infrastructure

The Conti ransomware variant proved devastatingly efficient, attacking greater than 1,000 victims throughout roughly 47 U.S. states, the District of Columbia, Puerto Rico, and 31 international nations.

Federal authorities estimate the conspiracy generated not less than $150 million in ransom funds by January 2022. In 2021 alone, Conti was accountable for extra assaults on important infrastructure than every other ransomware variant, making it one of the crucial harmful cyber threats dealing with important providers.

Court docket filings allege that Lytvynenko managed stolen knowledge from quite a few Conti victims and took part in crafting ransom notes deployed on compromised techniques. In Tennessee particularly, the conspirators allegedly extorted greater than $500,000 in cryptocurrency from two victims and printed stolen data from a 3rd sufferer within the district.

On the request of U.S. authorities, An Garda Síochána, Eire’s nationwide police drive, arrested Lytvynenko in July 2023. Following detention and extradition proceedings that concluded this month, he was transferred to American custody.

Court docket paperwork reveal that Lytvynenko allegedly continued partaking in cybercrime till days earlier than his arrest in Eire. Lytvynenko faces costs of conspiracy to commit pc fraud and conspiracy to commit wire fraud.

If convicted, he might obtain a most sentence of 5 years in jail for pc fraud conspiracy and an extra 20 years for wire fraud conspiracy. His case is being prosecuted by the Justice Division’s Laptop Crime and Mental Property Part alongside the U.S. Legal professional’s Workplace for the Center District of Tennessee.

This extradition represents continued efforts by U.S. regulation enforcement to pursue ransomware operators globally. In September 2023, an indictment charging 4 different Conti conspirators was unsealed in Tennessee.

Since 2020, the Laptop Crime and Mental Property Part has secured convictions of over 180 cybercriminals and obtained court docket orders returning greater than $350 million to victims.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Conti, Deploying, Extradited, Group, Member, Ransomware, Responsible, USA

Post navigation

Previous Post: Claude AI APIs Can Be Abused for Data Exfiltration
Next Post: New Business Email Protection Technique Blocks the Phishing Email Behind NPM Breach

Related Posts

Lumma Infostealer Steal All Data Stored in Browsers and Selling Them in Underground Markets as Logs Cyber Security News
Chrome 143 Released With Fix for 13 Vulnerabilities that Enables Arbitrary Code Execution Cyber Security News
Predator Spyware Compamy Used 15 Zero-Days Since 2021 to Target iOS Users Cyber Security News
Microsoft Dismantles 300+ Websites Used to Distribute RaccoonO365 Phishing Service Cyber Security News
Massive Phishing Attack Impersonate as Travel Brands Attacking Users with 4,300 Malicious Domains Cyber Security News
Hackers Actively Exploiting Cisco and Citrix 0-Days in the Wild to Deploy Webshell Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Pulsar RAT Attacking Windows Systems via Per-user Run Registry Key and Exfiltrates Sensitive Details
  • Open VSX Publisher Account Hijacked in Fresh GlassWorm Attack
  • Hackers Exploiting Microsoft Office 0-day Vulnerability to Deploy Malware
  • Default ICS Credentials Exploited in Destructive Attack on Polish Energy Facilities
  • Autonomous AI Agents Are Becoming the New Operating System of Cybercrime

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Pulsar RAT Attacking Windows Systems via Per-user Run Registry Key and Exfiltrates Sensitive Details
  • Open VSX Publisher Account Hijacked in Fresh GlassWorm Attack
  • Hackers Exploiting Microsoft Office 0-day Vulnerability to Deploy Malware
  • Default ICS Credentials Exploited in Destructive Attack on Polish Energy Facilities
  • Autonomous AI Agents Are Becoming the New Operating System of Cybercrime

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark