Connect with us

Hi, what are you looking for?



Russian TrickBot Malware Developer Sentenced to Prison in US

Vladimir Dunaev sentenced to 5 years in prison after admitting to participating in the development and distribution of the TrickBot malware.

A Russian national has been sentenced in the US to five years and four months in prison for his role in the development and distribution of the TrickBot malware.

On November 30, 2023, the man, Vladimir Dunaev, 40, of Amur Oblast, Russia, admitted in court to his role in the TrickBot scheme, which caused tens of millions of dollars in losses to organizations worldwide, including schools and hospitals.

Taken down in 2022, TrickBot had infected millions of computers worldwide since 2016, stealing sensitive information, including banking credentials, credit card numbers, and personal information, and being used to deploy other malware families, including ransomware such as Ryuk and Conti.

Involved in the TrickBot operation between 2015 and 2020, Dunaev created tools for credential harvesting and information theft, facilitated remote access to victim machines, and enhanced TrickBot’s evasion capabilities.

According to the US Department of Justice, during Dunaev’s involvement in the scheme, ransomware deployed via TrickBot was used to defraud 10 victims in the US, including schools and a real-estate company, of more than $3.4 million.

Dunaev, who was extradited to the US in 2021 following his arrest in South Korea, was indicted along with six other defendants for their involvement in the development, deployment, and management of TrickBot.

In February and September last year, the US slapped sanctions against members of the TrickBot group and announced charges against individuals believed to be involved in the malware’s development.

“Dunaev’s case demonstrates that the Justice Department and our office will use all available resources to investigate and prosecute cybercrime, and we thank our international partners for their cooperation in helping us stop cybercriminals like Dunaev and bring them to justice,” U.S. Attorney Rebecca C. Lutzko commented.

Advertisement. Scroll to continue reading.

Related: Owner of Cybercrime Website BreachForums Sentenced to Supervised Release

Related: Los Angeles SIM Swapper Sentenced to 8 Years in Prison

Related: Florida SIM Swapper Sentenced to Prison for Cryptocurrency Theft

Written By

Ionut Arghire is an international correspondent for SecurityWeek.


Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn about active threats targeting common cloud deployments and what security teams can do to mitigate them.


Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.


Expert Insights

Related Content


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.