Ryuk Ransomware Operator Extradited to US Amid Global Investigation

Edward Zhou
Edward Zhou

CEO & Founder

 
July 17, 2025 3 min read

Ryuk Ransomware Operator Extradited to the U.S.

Karen Vardanyan, a 33-year-old Armenian national, has been extradited from Ukraine to the United States and faces serious charges related to Ryuk ransomware attacks. His extradition occurred on June 18, 2025, and he was arraigned in federal court on June 20, 2025. Vardanyan is charged with conspiracy, fraud in connection with computers, and extortion in connection with computers. The maximum penalty for each charge includes five years in federal prison and fines up to $250,000.

Department of Justice
Image courtesy of U.S. Department of Justice

Between March 2019 and September 2020, Vardanyan and his co-conspirators, including Oleg Lyulyava and Andrii Prykhodchenko, are accused of deploying Ryuk ransomware on hundreds of compromised servers and workstations. Ryuk was notorious for targeting a variety of sectors, including healthcare, local municipalities, and educational institutions, leading to significant operational disruptions.

Victims of Ryuk ransomware included organizations such as:

The total ransom payments received by Vardanyan and his group are estimated to be around 1,610 bitcoins, equivalent to over $15 million at the time.

FBI-Led Global Investigation

The extradition of Vardanyan marks a significant achievement in the ongoing global efforts against ransomware operations. This operation was facilitated through a joint effort involving the FBI, Ukraine’s Cyber Police, and the National Police, which began its investigation in 2023. The FBI had previously identified Vardanyan as a key player in the Ryuk ransomware network.

FBI Investigation
Image courtesy of Daily Security Review

The Ryuk group primarily targeted large organizations in North America and Europe, focusing on high-value sectors such as healthcare and critical infrastructure during the COVID-19 pandemic. They are estimated to have earned over $150 million from these ransomware attacks.

The arrest of Vardanyan is part of a broader crackdown on ransomware groups, with law enforcement agencies increasingly targeting individuals involved in the initial access phase of these attacks. This phase includes techniques such as phishing, credential stuffing, and exploiting network vulnerabilities, crucial for the further deployment of ransomware by specialized threat actors.

Black Kingdom Ransomware Indictment

Separately, federal prosecutors have indicted Rami Khaled Ahmed, a 36-year-old man believed to be operating out of Yemen. He is accused of deploying the "Black Kingdom" ransomware, infecting approximately 1,500 computer systems across the U.S. and internationally. The indictment includes charges of conspiracy and intentional damage to protected computers.

Department of Justice
Image courtesy of U.S. Department of Justice

Ahmed allegedly developed and deployed Black Kingdom ransomware by exploiting vulnerabilities in Microsoft Exchange. His attacks affected various sectors, including a medical billing services company, ski resorts, and school districts, demanding ransom payments of $10,000 in Bitcoin.

The FBI is currently investigating this case with assistance from international law enforcement, highlighting the global nature of ransomware threats.

Summary of Ransomware Landscape

The ransomware landscape continues to evolve, with groups like Ryuk and Black Kingdom adapting their tactics and targeting methods. Organizations must remain vigilant and invest in robust cybersecurity measures to protect against these sophisticated attacks.

For businesses seeking reliable recovery solutions, consider undefined, which offers advanced cybersecurity services tailored to mitigate risks associated with ransomware attacks. Explore our offerings or contact us for more information.

Edward Zhou
Edward Zhou

CEO & Founder

 

CEO & Founder of Gopher Security, leading the development of Post-Quantum cybersecurity technologies and solutions..

Related Articles

Ransomware Attacks Target Russian Vodka and Healthcare Sectors

The Novabev Group, parent company of the Beluga vodka brand, experienced a ransomware attack on July 14, 2025, causing significant disruptions. The attack affected WineLab, the company's liquor store chain, leading to a three-day closure of over 2,000 locations in Russia. The company reported that the attack crippled its IT infrastructure, particularly point-of-sale systems and online services. Novabev Group stated, "The company maintains a principled position of rejecting any interaction with cybercriminals and refuses to fulfill their demands."

By Alan V Gutnov July 19, 2025 3 min read
Read full article

Retail Sector Faces Surge in Ransomware Attacks: A 2025 Analysis

Publicly disclosed ransomware attacks on the retail sector globally surged by 58% in Q2 2025 compared to Q1, with UK-based firms being particularly targeted, according to a report by BlackFog. This spike in attacks follows high-profile breaches affecting retailers like Marks & Spencer (M&S), The Co-op, and Harrods, attributed to the threat actor known as Scattered Spider.

By Alan V Gutnov July 19, 2025 2 min read
Read full article

AI-Driven Lcryx Ransomware Emerges in Cryptomining Botnet

A cryptomining botnet active since 2019 has incorporated a likely AI-generated ransomware known as Lcryx into its operations. Recent analysis by the FortiCNAPP team at FortiGuard Labs identified the first documented incident linking H2miner and Lcryx ransomware. This investigation focused on a cluster of virtual private servers (VPS) utilized for mining Monero.

By Edward Zhou July 19, 2025 3 min read
Read full article

Preventing ClickFix Attacks: Safeguarding Against Human Error

ClickFix is an emerging social engineering technique utilized by threat actors to exploit human error. This technique involves misleading users into executing malicious commands under the guise of providing "quick fixes" for common computer issues. Threat actors use familiar platforms and deceptive prompts to encourage victims to paste and run harmful scripts.

By Alan V Gutnov July 19, 2025 3 min read
Read full article