Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Russia Managing Cybercrime Groups

October 24, 2025
Reading Time: 3 mins read
in News
Cryptomus Fined 177M By FINTRAC

The relationship between the Russian government and its vast cybercrime ecosystem has fundamentally changed, according to a recent report by cybersecurity firm Recorded Future. Previously, the state’s intelligence services were known to tolerate cybercriminals, who in turn would often provide information and conduct various activities on the state’s behalf, effectively allowing them to operate unhindered. This already-existing connection, especially with intelligence and law enforcement, was reinforced and shifted following the 2022 invasion of Ukraine, leading many threat actors to pledge allegiance to the Kremlin. This evolution moved the state’s role from passive tolerance to active management, turning cybercrime into a strategic tool for influence and information acquisition, in addition to its commercial value.

International law enforcement actions, such as Operation Endgame, which targeted various botnets, malware loaders, and money laundering services, have significantly pressured this state-cybercriminal interaction. In response to these external takedowns, Russian authorities have adopted a more aggressive and selective stance, conducting high-profile arrests and seizures. This selective enforcement has been described as a way to “govern the market,” with authorities recruiting or co-opting useful talent, selectively enforcing laws when actors become politically inconvenient, and ultimately leveraging the ecosystem as a geopolitical instrument. However, this has resulted in a fracturing of the cybercriminal underground, with actors turning to decentralized operations and increased paranoia to evade surveillance and domestic scrutiny.

This new pattern of selective targeting is best explained through a cost-benefit calculus. Recorded Future notes that high-value ransomware ecosystems with strategic utility to the state persist and are left largely untouched, while expendable cash-out infrastructure is targeted. This dichotomy was clearly demonstrated when Russian authorities quickly announced raids, arrests, and asset seizures against services like Cryptex and UAPS shortly after they were disrupted by Operation Endgame and sanctioned by the US. Conversely, individuals associated with major groups like Conti and TrickBot, which were also targeted by Operation Endgame and are on Europol’s most wanted list, have been shielded, with leaked chats suggesting their senior members maintain direct connections with Russian intelligence services.

The choice of targets and the lead agencies involved—targeting financial facilitators with low intelligence value through the Investigative Committee rather than core operators with ties to security services—aligns with a delicate equilibrium. The reciprocal arrangement between cybercriminals and security services is complex: criminals likely pay for protection and are available to support the state when called upon, with their continued insulation depending on their political cost, external pressure, and usefulness. If an actor becomes too politically significant or fails to provide adequate support, security services are willing to use their legitimate policing powers to target or harass them, ensuring compliance and control over the market, rather than its complete eradication.

Consequently, the underground has had to adapt to this new environment, leading to increased distrust and new operational security measures. Over the past year, ransomware-as-a-service (RaaS) affiliate programs have decreased their open advertisements, pivoting toward semi-closed recruitment that often favors Russian-speaking affiliates over English-speaking ones, a rational response to perceived infiltration and selective domestic enforcement. While the underlying criminal business remains attractive, the bar for trust has been raised, and the emergence of impersonators, data resale schemes, and paranoia among affiliates reflects the increased pressure and the constant need to adapt to both international law enforcement and the selective governance of the Russian state.

Reference:

  • Russian Government Now Actively Managing Cybercrime Groups Security Firm Reports
Tags: Cyber NewsCyber News 2025Cyber threatsOctober 2025
ADVERTISEMENT

Related Posts

Cryptomus Fined 177M By FINTRAC

Cryptomus Fined 177M By FINTRAC

October 24, 2025
Cryptomus Fined 177M By FINTRAC

SpaceX Cuts Starlink In Myanmar

October 24, 2025
NY DFS Updates Third Party Cyber Rules

NY DFS Updates Third Party Cyber Rules

October 23, 2025
NY DFS Updates Third Party Cyber Rules

Keycard Raises 38 Million Funding

October 23, 2025
NY DFS Updates Third Party Cyber Rules

Jaguar Land Rover Cyberattack Hits UK

October 23, 2025
Hackers Make 520K At Pwn2Own

Hackers Make 520K At Pwn2Own

October 22, 2025

Latest Alerts

China Hackers Breach Telecom Firm

YouTube Videos Used As Malware Traps

Lazarus Hits European Defense Firms

Gift Card Heist Via Cloud Hackers

MuddyWater Launches Global Spying

Fake Zoom Calls Target Ukraine Aid

Subscribe to our newsletter

    Latest Incidents

    Hackers Breach Verstappen Data

    Toys R Us Canada Data Breach Alert

    Shaq Range Rover Stolen After Hack

    Ransomware Hits Jewett Cameron

    Salt Typhoon Hacks European Telecom

    JFL Loses 800K Weekly After Hack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial