Nefilim Ransomware Operator Pleads Guilty in U.S. Court

Ukrainian Operator of Nefilim Ransomware, Artem Stryzhak, Pleads Guilty to Conspiracy Charges

HIGH
December 20, 2025
5m read
RansomwareThreat ActorRegulatory

Related Entities

Threat Actors

Other

Artem Aleksandrovych StryzhakVolodymyr TymoshchukUkraineUnited StatesSpain

Full Report

Executive Summary

On December 19, 2025, Artem Aleksandrovych Stryzhak, a 35-year-old Ukrainian national, pleaded guilty to conspiracy to commit fraud and extortion for his participation in the Nefilim ransomware operation. The plea took place in a Brooklyn federal court following his extradition from Spain. Stryzhak was a key member of the Nefilim group, which conducted a series of highly damaging ransomware attacks against large corporations primarily in the United States, Canada, and Australia from mid-2018 to late 2021. The group employed a double-extortion model, exfiltrating sensitive corporate data before encrypting victim networks and then threatening to publish the stolen data on a dedicated leak site to coerce payment. Stryzhak faces a maximum sentence of 10 years in prison. His alleged co-conspirator, Volodymyr Tymoshchuk, remains a fugitive, with the U.S. Department of State offering a reward of up to $11 million for information leading to his capture.


Threat Overview

  • Threat Actor: Nefilim ransomware group.
  • Key Individuals: Artem Aleksandrovych Stryzhak (arrested operator), Volodymyr Tymoshchuk (fugitive administrator).
  • Modus Operandi: The group specialized in 'big game hunting,' specifically targeting companies with annual revenues exceeding $100 million. Their attacks followed a clear pattern:
    1. Reconnaissance: Researching target companies to assess financial value.
    2. Initial Access: Gaining entry to the network, often through exploiting vulnerabilities in public-facing applications or using stolen credentials.
    3. Data Exfiltration: Stealing large volumes of sensitive corporate data.
    4. Encryption: Deploying customized ransomware executables to encrypt the victim's systems.
    5. Extortion: Demanding a ransom payment for the decryption key and threatening to publish the stolen data on their 'Corporate Leaks' dark web site if the victim refused to pay.

Technical Analysis

While the court documents do not detail the full TTPs, the Nefilim group's activities are well-documented by security researchers. Their attack chain typically involved several MITRE ATT&CK techniques:

  1. Initial Access: Nefilim often gained initial access by exploiting vulnerabilities in internet-facing devices, particularly VPNs and other remote services (T1190 - Exploit Public-Facing Application).
  2. Execution & Persistence: Once inside, they used legitimate tools like PsExec and PowerShell for execution and lateral movement (T1059.001 - PowerShell). They would establish persistence by creating new user accounts or scheduled tasks (T1136 - Create Account).
  3. Credential Access: The group was known to use tools like Mimikatz to dump credentials from memory to escalate privileges and move laterally (T1003 - OS Credential Dumping).
  4. Lateral Movement: Using the stolen credentials, they moved across the network to identify high-value data and domain controllers (T1021.002 - SMB/Windows Admin Shares).
  5. Exfiltration: Before encryption, they would exfiltrate large amounts of data to attacker-controlled servers (T1041 - Exfiltration Over C2 Channel).
  6. Impact: Finally, they deployed the Nefilim ransomware payload across the network, encrypting files and leaving a ransom note (T1486 - Data Encrypted for Impact).

Impact Assessment

The Nefilim group was responsible for millions of dollars in losses, stemming from ransom payments, operational downtime, and recovery costs. Their targeting of high-revenue companies meant that each successful attack could cause significant economic and reputational damage. The double-extortion tactic added a layer of pressure, as victims had to contend not only with operational disruption from encryption but also with the severe consequences of a public data breach, including regulatory fines and loss of customer trust.


Detection & Response

D3FEND Reference: D3-UBA: User Behavior Analysis, D3-NTA: Network Traffic Analysis

  1. Monitor for Legitimate Tools: Nefilim's use of 'living-off-the-land' binaries (LOLBins) like PsExec and PowerShell for malicious purposes requires behavioral analysis. Monitor for PsExec being used to connect to multiple workstations from a non-admin source or PowerShell scripts executing encoded commands.
  2. Credential Dumping Detection: Deploy EDR solutions that can detect and block memory-scraping activities characteristic of tools like Mimikatz.
  3. Network Egress Monitoring: Monitor outbound network traffic for large, anomalous data transfers, especially to unknown or newly registered domains. This is a key indicator of data exfiltration preceding a ransomware attack.
  4. Active Directory Auditing: Audit Active Directory for the creation of new administrative accounts or changes to group memberships, which are common persistence and privilege escalation techniques.

Mitigation

D3FEND Reference: D3-SU: Software Update, D3-MFA: Multi-factor Authentication, D3-NS: Network Segmentation

  1. Patch Management: The most effective way to prevent initial access is to maintain a rigorous patch management program, focusing on internet-facing systems like VPNs, RDP gateways, and web servers.
  2. Multi-Factor Authentication (MFA): Enforce MFA on all remote access solutions (VPNs, RDP) and for all privileged accounts. This mitigates the risk of stolen credentials being used for initial access.
  3. Network Segmentation: Segment the network to prevent attackers from moving laterally with ease. Critical assets, such as domain controllers and backup servers, should be in highly restricted network segments.
  4. Immutable Backups: Maintain regular, offline, and immutable backups of critical data. A 3-2-1 backup strategy (3 copies, 2 different media, 1 offsite) is essential to recover from a ransomware attack without paying the ransom.
  5. Principle of Least Privilege: Ensure that user and service accounts only have the permissions necessary to perform their roles. This limits the impact of a compromised account.

Timeline of Events

1
June 1, 2024
Artem Stryzhak was arrested in Spain.
2
April 1, 2025
Stryzhak was extradited to the U.S.
3
December 19, 2025
Artem Stryzhak pleaded guilty in a U.S. federal court.
4
December 20, 2025
This article was published

MITRE ATT&CK Mitigations

Regularly patching internet-facing systems prevents the initial access vectors commonly used by Nefilim.

Mapped D3FEND Techniques:

MFA on remote services is a critical defense against credential-based attacks.

Mapped D3FEND Techniques:

Segmenting the network limits an attacker's ability to move laterally after an initial compromise.

Mapped D3FEND Techniques:

Using EDR to detect and block malicious behaviors, such as credential dumping or suspicious use of PowerShell.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To counter Nefilim's double-extortion tactic, organizations must focus on preventing data exfiltration. Implement strict outbound traffic filtering rules on perimeter firewalls. By default, deny all outbound traffic from servers and workstations, and only allow connections to known, legitimate destinations on necessary ports (e.g., TCP/443 to trusted partner APIs or software update servers). This 'egress filtering' makes it significantly harder for attackers to exfiltrate stolen data. Combine this with network traffic analysis (NTA) to alert on any large data transfers leaving the network, especially from servers that do not typically send large amounts of data externally. This provides a critical window to detect and interrupt an attack between initial compromise and the final ransomware deployment.

A robust backup and recovery strategy is the ultimate defense against the 'impact' phase of a ransomware attack. Organizations must adhere to the 3-2-1 rule: maintain at least three copies of data, on two different types of media, with one copy stored offsite and offline or immutable. Nefilim, like many ransomware groups, will attempt to find and delete backups to ensure the victim has no choice but to pay. Therefore, it is critical that the offline/immutable copy is logically separated from the primary network and cannot be accessed or deleted by an attacker who has compromised the domain administrator account. Regularly test backup restoration procedures to ensure they are effective and to meet recovery time objectives (RTOs).

Nefilim's reliance on legitimate system tools ('living off the land') for malicious activities requires advanced process analysis for detection. Deploy an Endpoint Detection and Response (EDR) solution capable of monitoring process parent/child relationships and command-line arguments. Create detection rules for suspicious use of tools like psexec.exe, wmic.exe, and powershell.exe. For example, alert when psexec.exe is launched by a non-administrative user or when PowerShell executes a base64-encoded command. By baselining normal administrative activity, security teams can identify when these powerful tools are being abused by threat actors for lateral movement and execution, providing an early opportunity to isolate compromised systems and disrupt the attack chain.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Double ExtortionBig Game HuntingCybercrimeDOJExtradition

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading