Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Suspected DoppelPaymer Ransomware Group Member Arrested

Posted on May 13, 2025May 13, 2025 By CWS

Authorities in Moldova on Monday introduced the arrest of a person suspected of being concerned in DoppelPaymer ransomware assaults.

The suspect, a 45-year-old foreigner whose identification was not disclosed, was wished for his alleged involvement in ransomware assaults, extortion, and cash laundering in opposition to organizations within the Netherlands.

Moldovan authorities, with help from Dutch legislation enforcement, searched the suspect’s home and automotive, and seized two laptops, a cell phone, a pill, two moveable drives, six reminiscence playing cards, six financial institution playing cards, an digital pockets, and €84,800 (~$94,000).

In line with Moldovan authorities, the suspect was concerned in a ransomware assault in opposition to the Dutch Analysis Council (NWO), inflicting roughly €4.5 million (~$5 million) in losses. The person stays in custody, awaiting extradition to the Netherlands.

The scientific group disclosed the assault in February 2021, saying that the DoppelPaymer ransomware was used, that community drives have been blocked, and that some information have been stolen. NWO didn’t pay a ransom and the ransomware group printed the stolen information on-line.

The DoppelPaymer ransomware emerged in 2019, as a forked model of BitPaymer, believed to be linked to TA505, also referred to as Evil Corp, the cybercrime group behind the Dridex Trojan and Locky ransomware.

It was utilized in assaults in opposition to important infrastructure, in addition to organizations within the healthcare, training, and different sectors.

In February 2023, authorities in Germany and Ukraine, with help from the FBI, Europol, and Dutch legislation enforcement, raided a number of areas in a coordinated operation in opposition to the DoppelPaymer ransomware-as-a-service (RaaS) operation.Commercial. Scroll to proceed studying.

In March 2023, Europol introduced that eleven people related to the RaaS have been recognized and that some have been detained. Nonetheless, three key members of the group, Igor Olegovich Turashev, Irina Zemlianikina, and Igor Garshin, believed to be positioned in Russia, remained at giant.

Associated: LockBit Ransomware Admin Panel Hacked, Leaks Reveal Inside Particulars

Associated: Europol Broadcasts Extra DDoS Service Takedowns, Arrests

Associated: 300 Arrested in Crackdown on Cybercrime Rings in Africa

Associated: Authorities Disrupt 8Base Ransomware, Arrest 4 Russian Operators

Security Week News Tags:Arrested, DoppelPaymer, Group, Member, Ransomware, Suspected

Post navigation

Previous Post: Orca Snaps Up Opus in Cloud Security Automation Push
Next Post: North Korean Konni APT Targets Ukraine with Malware to track Russian Invasion Progress

Related Posts

263,000 Impacted by Esse Health Data Breach Security Week News
Choosing a Clear Direction in the Face of Growing Cybersecurity Demands Security Week News
Valuable Information Leaked in LockBit Ransomware Hack  Security Week News
Chrome 137 Update Patches High-Severity Vulnerabilities Security Week News
Qantas Data Breach Impacts Up to 6 Million Customers  Security Week News
New AI Jailbreak Bypasses Guardrails With Ease Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News