
The U.S. Department of Justice (DoJ) has announced the seizure of more than $2.8 million in cryptocurrency from suspected ransomware operator Ianis Aleksandrovich Antropenko, indicted in Texas for computer fraud and money laundering.
Authorities also confiscated $70,000 in cash and a luxury vehicle as part of the crackdown.

The DOJ seized $2.8 million in cryptocurrency linked to Zeppelin ransomware proceeds.
Zeppelin first appeared in late 2019 as a variant of the VegaLocker/Buran ransomware. It primarily targeted healthcare and IT firms through flaws in MSP software. The operators encrypted and exfiltrated victims’ data, demanding ransom to restore files or prevent leaks.
In 2021, Zeppelin returned after a period of dormancy with updated versions, though sloppy encryption hinted at weaker execution. By November 2022, the operation was essentially defunct, and researchers later revealed they had the decryption key since 2020, helping victims recover files without paying.

Zeppelin ransomware’s evolution from 2019 to its decline in 2022.
These laundering methods aimed to obscure the source of illicit funds, but investigators were able to trace them back.
The indictment shows that even years after a ransomware group shuts down, evidence can still unmask its operators. Seizing the ransom proceeds is crucial because it:
This seizure follows other recent U.S. actions:
The Zeppelin case highlights the long reach of law enforcement in cybercrime investigations. Even when ransomware groups go dormant, financial trails can expose operators years later.
Seizing their profits cuts off the fuel that powers ransomware operations, making the ecosystem less lucrative and more dangerous for would-be attackers.
Phishing has transformed from simple email scams into sophisticated, AI-powered social engineering campaigns. Explore its evolution, why it remains so effective, and how to protect your organization in 2024.
A new wave of Noodlophile malware attacks is spreading worldwide — this time using fake copyright infringement notices to trick businesses. Here’s how the campaign works and what you need to know to stay safe.
Indian IT giants TCS and Cognizant are facing cyberattacks, ransom demands, and lawsuits linked to social engineering. Discover how hackers exploit trust, third-party access, and human behavior to infiltrate enterprises.