HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High🔍 ThreatIntel

Russian Botnet Operator Sentenced for Enabling BitPaymer Ransomware Attacks on 72 U.S. Companies

Ilya Angelov, a Russian cybercriminal, received a two‑year prison term for running a phishing botnet that supplied compromised hosts to ransomware affiliates. The botnet powered BitPaymer attacks against 72 U.S. companies, generating over $14 million in extortion payments, underscoring a critical supply‑chain risk for third‑party risk managers.

🛡️ LiveThreat™ Intelligence · 📅 March 25, 2026· 📰 bleepingcomputer.com
🟠
Severity
High
🔍
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
1 sector(s)
Actions
3 recommended
📰
Source
bleepingcomputer.com

Russian Botnet Operator Sentenced for Enabling BitPaymer Ransomware Attacks on 72 U.S. Companies

What Happened — A Russian national, Ilya Angelov, pleaded guilty and was sentenced to two years in federal prison for managing a phishing‑driven botnet that supplied compromised hosts to ransomware affiliates. The botnet enabled BitPaymer ransomware attacks against 72 U.S. companies, resulting in more than $14 million in extortion payments.

Why It Matters for TPRM

  • Shows how a third‑party botnet service can become a critical “as‑a‑service” component of ransomware supply chains.
  • Highlights the speed and scale of spam‑based infection (up to 3 000 new bots per day) that can quickly infiltrate vendor environments.
  • Reinforces the need for continuous monitoring of email‑security controls and threat‑intel feeds for botnet‑related IOCs.

Who Is Affected — Enterprises across multiple sectors in the United States (technology, finance, healthcare, manufacturing, etc.) that were compromised by the BitPaymer ransomware campaign.

Recommended Actions

  • Verify that all vendors enforce DMARC, SPF, and DKIM and employ robust phishing‑prevention controls.
  • Incorporate botnet‑related IOCs (malware hashes, C2 domains, sender addresses) into SIEM and EDR detection rules.
  • Review and test ransomware incident‑response and backup‑restore procedures, ensuring backups are immutable and offline.

Technical Notes — The botnet was propagated via a massive spam campaign (~700 k emails/day) that delivered malware payloads. Infected machines were added to the “Mario Kart” botnet and later sold to ransomware‑as‑a‑service affiliates. No specific CVE was cited; the primary attack vector was phishing‑based credential compromise. Source: BleepingComputer

📰 Original Source
https://www.bleepingcomputer.com/news/security/russian-man-sentenced-for-operating-botnet-used-in-ransomware-attacks/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.