Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Suspected DoppelPaymer Ransomware Group Member Arrested

Posted on May 13, 2025May 13, 2025 By CWS

Authorities in Moldova on Monday introduced the arrest of a person suspected of being concerned in DoppelPaymer ransomware assaults.

The suspect, a 45-year-old foreigner whose identification was not disclosed, was wished for his alleged involvement in ransomware assaults, extortion, and cash laundering in opposition to organizations within the Netherlands.

Moldovan authorities, with help from Dutch legislation enforcement, searched the suspect’s home and automotive, and seized two laptops, a cell phone, a pill, two moveable drives, six reminiscence playing cards, six financial institution playing cards, an digital pockets, and €84,800 (~$94,000).

In line with Moldovan authorities, the suspect was concerned in a ransomware assault in opposition to the Dutch Analysis Council (NWO), inflicting roughly €4.5 million (~$5 million) in losses. The person stays in custody, awaiting extradition to the Netherlands.

The scientific group disclosed the assault in February 2021, saying that the DoppelPaymer ransomware was used, that community drives have been blocked, and that some information have been stolen. NWO didn’t pay a ransom and the ransomware group printed the stolen information on-line.

The DoppelPaymer ransomware emerged in 2019, as a forked model of BitPaymer, believed to be linked to TA505, also referred to as Evil Corp, the cybercrime group behind the Dridex Trojan and Locky ransomware.

It was utilized in assaults in opposition to important infrastructure, in addition to organizations within the healthcare, training, and different sectors.

In February 2023, authorities in Germany and Ukraine, with help from the FBI, Europol, and Dutch legislation enforcement, raided a number of areas in a coordinated operation in opposition to the DoppelPaymer ransomware-as-a-service (RaaS) operation.Commercial. Scroll to proceed studying.

In March 2023, Europol introduced that eleven people related to the RaaS have been recognized and that some have been detained. Nonetheless, three key members of the group, Igor Olegovich Turashev, Irina Zemlianikina, and Igor Garshin, believed to be positioned in Russia, remained at giant.

Associated: LockBit Ransomware Admin Panel Hacked, Leaks Reveal Inside Particulars

Associated: Europol Broadcasts Extra DDoS Service Takedowns, Arrests

Associated: 300 Arrested in Crackdown on Cybercrime Rings in Africa

Associated: Authorities Disrupt 8Base Ransomware, Arrest 4 Russian Operators

Security Week News Tags:Arrested, DoppelPaymer, Group, Member, Ransomware, Suspected

Post navigation

Previous Post: Orca Snaps Up Opus in Cloud Security Automation Push
Next Post: North Korean Konni APT Targets Ukraine with Malware to track Russian Invasion Progress

Related Posts

Five Zero-Days, 15 Misconfigurations Found in Salesforce Industry Cloud Security Week News
Technical Details Published for Critical Cisco IOS XE Vulnerability Security Week News
Sesame Workshop Regains Control of Elmo’s Hacked X Account After Racist Posts Security Week News
Russian Qakbot Gang Leader Indicted in US Security Week News
Google Project Zero Tackles Upstream Patch Gap With New Policy Security Week News
US Braces for Cyberattacks After Joining Israel-Iran War Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News