Skip to Content

DOJ Exposes Deep Ties Between Karakurt Ransomware Gang and Russian Government

Prosecutors say the cybercriminal group used Russian law enforcement databases and paid bribes to officials to shield its operations.

The U.S. Justice Department has pulled back the curtain on one of the most troubling relationships in modern cybercrime: the nexus between Russian ransomware gangs and the Kremlin itself. In a sentencing memo for Latvian hacker Deniss Zolotarjovs, prosecutors detailed how the Karakurt ransomware operation leaned on Russian government databases and corrupt law enforcement officials to terrorize its victims.

Zolotarjovs, who received more than eight years in prison, was a key member of Karakurt, a gang led by former operators of the notorious Akira and Conti ransomware strains. The group targeted more than 54 companies worldwide and collected at least $15 million in ransom payments. Its attacks were particularly brazen, disrupting 911 emergency dispatch systems in the United States and stealing sensitive children’s health records.

What sets the Karakurt case apart is the level of state integration U.S. officials say they have uncovered. According to the DOJ, gang leaders had direct access to Russian government databases, which they used to gather intelligence and pressure victims. The group also paid routine bribes to Russian officials, who in turn exempted members from compulsory military service and allowed the organization to avoid taxes.

Prosecutors described the arrangement as one that “fueled corruption” inside the Russian government. The revelation adds concrete detail to long-standing accusations from Western security researchers that Moscow deliberately shields cybercriminals from extradition and prosecution, treating ransomware gangs as informal proxies rather than priorities for law enforcement.

Why it matters

For enterprise security teams, the Karakurt case is a stark reminder that ransomware is not just a criminal enterprise—it is increasingly a state-adjacent threat. When attackers can tap government databases and enjoy official protection, the risk calculus changes. Organizations must assume that advanced ransomware groups operate with resources and impunity that rival nation-state actors, making robust backup strategies, zero-trust architectures, and incident response readiness more critical than ever.

DeepSeek Eyes $45 Billion Valuation in First-Ever Funding Round
The Chinese AI lab that shocked Silicon Valley is now seeking venture capital to keep top talent from defecting to rivals.