[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fBoxtusgvL_PsyfWssCF_M4pEcxdqe5yoZspwi0gLq44":3},{"article":4,"iocs":51},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":28,"category":29,"article_tags":33},"c9fb1005-6179-46ed-8bd5-5d0ed7ab2c86","Karakurt Ransomware Negotiator Sentenced to Prison","karakurt-ransomware-negotiator-sentenced-to-prison-d92cc7","Deniss Zolotarjovs was directly involved in extortion strategies and in negotiations with victim companies. The post Karakurt Ransomware Negotiator Sentenced to Prison appeared first on SecurityWeek.","Deniss Zolotarjovs, a 35-year-old Latvian member of the Karakurt ransomware gang, was sentenced to 8.5 years in prison after pleading guilty to extortion charges. Operating between June 2021 and March 2023, Zolotarjovs served as the group's negotiator and extortion specialist, handling ransom communications and analyzing stolen data from at least 53 victims, resulting in $56 million in losses. He received 10% of negotiated ransoms in cryptocurrency, including proceeds from pressuring a pediatric healthcare company to pay by threatening to publish patient data.","Latvian Karakurt ransomware negotiator sentenced to 8.5 years in US prison.","A Latvian member of the Karakurt ransomware gang was sentenced to 8.5 years in prison in the US for his involvement in extorting victims. The individual, Deniss Zolotarjovs, 35, of Latvia, was arrested in Georgia in December 2023 and extradited to the US in August 2024. He pleaded guilty in July 2025. Associated with the infamous Conti group and also known as TommyLeaks, Schoolboys Ransomware Gang, and Blockbit, Karakurt was one of the most notorious ransomware groups half a decade ago. In a 2022 alert, the US government warned of the group indiscriminately targeting organizations across multiple industries to steal sensitive information and extort ransom payments from them. The group is known for stealing personally identifiable information such as names, addresses, dates of birth, Social Security numbers, and healthcare information, and was also involved in the disruption of a 911 emergency system. Zolotarjovs was a member of the group between June 2021 and March 2023, documents presented in court show. During that time, Karakurt hit at least 53 entities, causing $56 million in losses.Advertisement. Scroll to continue reading. As part of the group, Zolotarjovs did not execute intrusions, but he was directly involved in extortion strategies and in negotiating with victim organizations. Online chats show that he was responsible for analyzing the stolen data and conducting ransom negotiations, or advising on them. In one instance, when a pediatric healthcare company did not immediately pay the ransom, Zolotarjovs helped escalate pressure on the victim and recommended publishing pediatric patient data online. Zolotarjovs, the court documents show, received 10% of the negotiated ransom payments and was paid in cryptocurrency, which he moved through multiple wallets before exchanging for Russian rubles. Related: Two US Security Experts Sentenced to Prison for Helping Ransomware Gang Related: Third US Security Expert Admits Helping Ransomware Gang Related: Medusa Ransomware Fast to Exploit Vulnerabilities, Breached Systems Related: German Police Unmask REvil Ransomware Leader Written By Ionut Arghire Ionut Arghire is an international correspondent for SecurityWeek. More from Ionut Arghire Boost Security Raises $4 Million for SDLC Defense PlatformChrome 148 Rolls Out With 127 Security FixesVendor Says Daemon Tools Supply Chain Attack ContainedCisco Patches High-Severity Vulnerabilities in Enterprise ProductsGemini CLI Vulnerability Could Have Led to Code Execution, Supply Chain AttackHerd Security Raises $3 Million for AI-Powered Training PlatformIranian APT Intrusion Masquerades as Chaos Ransomware AttackSophisticated Quasar Linux RAT Targets Software Developers Latest News In Other News: Train Hacker Arrested, PamDOORa Linux Backdoor, New CISA Director FrontrunnerPolish Security Agency Reports ICS Breaches at Five Water Treatment PlantsAI Firm Braintrust Prompts API Key Rotation After Data BreachCyberattack Hits Canvas System Used by Thousands of Schools as Finals Loom‘PCPJack’ Worm Removes TeamPCP Infections, Steals CredentialsRansomware Group Takes Credit for Trellix HackVulnerability in Claude Extension for Chrome Exposes AI Agent to TakeoverIvanti Patches EPMM Zero-Day Exploited in Targeted Attacks Trending Daily Briefing NewsletterSubscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Webinar: ROSI for CPS Security Programs May 13, 2026 In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities. Register Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the MoveMalwarebytes has named Chung Ip as Chief Financial Officer.Semperis has appointed John Podboy as Chief Information Security Officer.Randy Menon has become Chief Product and Marketing Officer at One Identity.More People On The MoveExpert Insights The Mythos Moment: Enterprises Must Fight Agents with Agents Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor) Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George) Government Can’t Win the Cyber War Without the Private Sector Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin) The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb) The New Rules of Engagement: Matching Agentic Attack Speed The cybersecurity response to AI-enabled nation-state threats cannot be incremental. It must be architectural. (Nadir Izrael) Flipboard Reddit Whatsapp Whatsapp Email","https:\u002F\u002Fwww.securityweek.com\u002Fkarakurt-ransomware-negotiator-sentenced-to-prison\u002F","https:\u002F\u002Fwww.securityweek.com\u002Fwp-content\u002Fuploads\u002F2024\u002F10\u002Fhacker-prison-sentence.jpeg","2026-05-05T10:55:00+00:00","2026-05-05T12:00:12.884947+00:00",8,[18,21,23,26],{"name":19,"type":20},"Deniss Zolotarjovs","threat_actor",{"name":22,"type":20},"Karakurt",{"name":24,"type":25},"Karakurt (TommyLeaks, Schoolboys, Blockbit)","campaign",{"name":27,"type":20},"Conti","7d8b5ab8-ea0b-4ced-ae97-ec251b86993a",{"id":28,"icon":30,"name":31,"slug":32},null,"Ransomware","ransomware",[34,39,41,46],{"category":35},{"id":36,"icon":30,"name":37,"slug":38},"6cbdd207-aaa1-4176-9534-e156b125e917","Nation-state","nation-state",{"category":40},{"id":28,"icon":30,"name":31,"slug":32},{"category":42},{"id":43,"icon":30,"name":44,"slug":45},"c5c77cdb-f7d7-4990-9436-c81dcbff1163","Policy","policy",{"category":47},{"id":48,"icon":30,"name":49,"slug":50},"e7b231c8-5f79-4465-8d38-1ef13aea5a14","Threat Intelligence","threat-intelligence",[52],{"type":53,"value":22,"context":54},"malware","Ransomware-as-a-service operation targeting multiple industries; active 2021-2023"]