Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

DoJ Seizes $2.8 Million in Crypto From Zeppelin Ransomware Operators

Posted on August 19, 2025August 19, 2025 By CWS

The U.S. Division of Justice (DoJ) introduced the seizure of over $2.8 million in cryptocurrency, $70,000 in money, and a luxurious automobile linked to Zeppelin ransomware operations. 

The warrants had been unsealed on August 14, 2025, in federal courts throughout Virginia, California, and Texas. 

Authorities allege that the belongings belong to Ianis Aleksandrovich Antropenko, who has been indicted within the Northern District of Texas for pc fraud, abuse, and cash laundering conspiracies.

Based on court docket paperwork, Antropenko and his associates leveraged Zeppelin ransomware to focus on companies, healthcare establishments, and different organizations worldwide. 

Key Takeaways1. DoJ seized $2.8M in crypto and belongings from Zeppelin ransomware operator.2. Zeppelin encrypted and stole information, demanding ransoms in bitcoin/monero.3. FBI blockchain tracing enabled the seizure, proving ransomware income might be tracked.

Victims’ recordsdata had been encrypted and exfiltrated, with ransom funds demanded in cryptocurrency—primarily bitcoin and monero—in change for decryption keys or assurances that stolen information wouldn’t be leaked publicly.

Authorities Seize $1.5M in Crypto

Based on the unsealed affidavits, the cryptocurrency that was confiscated was the results of ransomware exercise that was laundered by a lot of completely different channels. 

Notably, Antropenko utilized ChipMixer, a widely known cryptocurrency mixing service dismantled in 2023 throughout a joint worldwide regulation enforcement operation. 

Investigators tracked ransom funds throughout blockchain networks utilizing multi-input clustering methods, transaction graph evaluation, and temporal spending patterns.

Authorities decided that the funds had been repeatedly transferred after which consolidated right into a pockets managed instantly by Antropenko. 

Moreover linked to the laundering operation had been the transformed money deposits, which had been regularly set as much as evade banking-reporting thresholds. 

The investigation demonstrates how blockchain analytics, coupled with federal forfeiture statutes (18 U.S.C. § 981, 982), can efficiently disrupt refined cybercriminal cash actions.

The seizure was enabled by FBI blockchain evaluation and multi-district cooperation, underscoring that ransomware operators stay susceptible regardless of utilizing superior mixing instruments and laundering strategies.

Performing Assistant Lawyer Normal Matthew R. Galeotti emphasised that the seizure “proves that ransomware income, irrespective of how fastidiously hid, stay susceptible to regulation enforcement intervention.”

Since 2020, CCIPS has dismantled a number of ransomware teams, securing over $350 million in forfeited belongings and stopping a further $200 million in ransom funds. 

The Zeppelin case serves each as a warning and a precedent: even with the help of superior mixers and laundering methods, ransomware operators stay uncovered to coordinated investigative efforts.

The indictment stays an allegation, and Antropenko is presumed harmless till confirmed responsible in a court docket of regulation.

Safely detonate suspicious recordsdata to uncover threats, enrich your investigations, and reduce incident response time. Begin with an ANYRUN sandbox trial → 

Cyber Security News Tags:Crypto, DoJ, Million, Operators, Ransomware, Seizes, Zeppelin

Post navigation

Previous Post: Weaponized Python Package Termncolor Attacking Leverages Windows Run Key to Maintain Persistence
Next Post: Threat Actors Abuse Microsoft Help Index File to Execute PipeMagic Malware

Related Posts

VirtualBox 7.2 Released With Support for Windows 11/Arm VMs and Bug Fixes Cyber Security News
Earth Ammit Hackers Attacking Using New Tools to Attack Drones Used in Military Sectors Cyber Security News
Hacker Extradited to US for Stealing Over $2.5 Million in Tax Fraud Attacks Cyber Security News
Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers Cyber Security News
Hackers Actively Exploiting Langflow RCE Vulnerability to Deploy Flodrix Botnet Cyber Security News
17K+ SharePoint Servers Exposed to Internet Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • High-Severity Vulnerabilities Patched in Chrome, Firefox
  • Intel Employee Data Exposed by Vulnerabilities
  • Chrome High-Severity Vulnerability Let Attackers Crash Browser or Execute Arbitrary Code
  • New Salty 2FA PhaaS platform Attacking Microsoft 365 Users to Steal Login Credentials
  • DOJ Charges 22-Year-Old for Running RapperBot Botnet Behind 370,000 DDoS Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • High-Severity Vulnerabilities Patched in Chrome, Firefox
  • Intel Employee Data Exposed by Vulnerabilities
  • Chrome High-Severity Vulnerability Let Attackers Crash Browser or Execute Arbitrary Code
  • New Salty 2FA PhaaS platform Attacking Microsoft 365 Users to Steal Login Credentials
  • DOJ Charges 22-Year-Old for Running RapperBot Botnet Behind 370,000 DDoS Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News