A coordinated international effort dismantled the core of a sophisticated malware network, striking a significant blow to Russian-led cybercrime. Police forces from Britain, Canada, Denmark, the Netherlands, France, Germany, and the U.S. worked together to disrupt operations run by cybercriminals based primarily in Russia.
Authorities have issued arrest warrants for 20 suspects and unsealed indictments against 16 others involved in leading malware operations like Qakbot, Danabot, and Conti. These groups have been linked to attacks targeting governments, businesses, and critical infrastructure worldwide.
What’s Happening & Why This Matters
Details of the Malware Operations and Key Figures
The operation presents the scale and complexity of modern cybercrime. Cross-border collaboration is needed to tackle threats that undermine global security and economic stability.
Among those charged are key figures such as Rustam Rafailevich Gallyamov from Moscow, Aleksandr Stepanov (aka JimmBee), and Artem Kalinkin (aka Onix) from Novosibirsk. The U.S. Department of Justice describes them as leaders behind destructive malware campaigns.

The infamous Conti ransomware group, led by Russian national Vitalii Nikolayevich Kovalev, known as Stern or Ben, is a primary target. German investigators call Kovalev “one of the most successful blackmailers in cybercrime history,” responsible for hundreds of attacks globally, including against hospitals during the COVID-19 pandemic.
Kovalev allegedly controls several ransomware groups and boasts a cryptocurrency wallet valued at around €1 billion. Despite his international notoriety, Kovalev likely resides in Moscow, complicating extradition efforts.
Crime Network’s Global Reach and Impact
The cybercrime syndicate infected over 300,000 computers worldwide, targeting countries like the U.S., Australia, Poland, India, and Italy. They exploited criminal forums to recruit members and used espionage malware to spy on military and government organizations.
Stolen data was funneled through servers based in Russia, raising concerns about state tolerance or complicity. Among those most wanted is Roman Mikhailovich Prokop, a suspected Qakbot member of Russian-speaking Ukrainian descent.
Operation Endgame: A German-Led Response

Operation Endgame, the crackdown, began in 2022 under the leadership of the German Bundeskriminalamt (BKA). BKA president Holger Münch emphasized Germany’s vulnerability as a major target for cybercriminals, especially amid increasing ransomware attacks.
Authorities are investigating suspects for gang-related crime, extortion, and membership in overseas criminal organizations. The operation confirms that cybercriminals cannot hide even in darknet spaces believed to be anonymous.
While most suspects remain in Russia or Dubai, where extradition is unlikely, their identification sends a clear message and disrupts their activities.
TF Summary: What’s Next
Dismantling this Russian cybercrime network underscores the importance of multinational cooperation in combating global cyber threats. Continued vigilance and collaboration will be necessary to protect digital infrastructure from increasingly sophisticated attacks.
Law enforcement agencies will keep improving tactics to penetrate cybercriminal ecosystems and hold perpetrators accountable.
— Text-to-Speech (TTS) provided by gspeech