Ransomware hackers purchase a bank to forward crypto in Stablecoin to Russia

default-cybersecurity-insiders-image

In recent years, we’ve all become increasingly familiar with the rising tide of double and triple extortion cyberattacks. These attacks typically involve hackers stealing sensitive data, encrypting it, and then demanding a ransom for both the decryption key and a promise not to release the data. Some criminal groups even go so far as to release decryption keys for free, citing “humanitarian” reasons.

But now, a new and alarming trend has emerged: ransomware gangs are taking things to the next level by directly laundering ransom payments through elaborate financial channels—often with the goal of funding foreign political agendas. One such gang has been accused of purchasing a bank in Kyrgyzstan to facilitate the transfer of ransom payments to Russia, using cryptocurrency as a middleman to obscure the illicit flow of funds.

This operation was uncovered by the UK’s National Crime Agency (NCA), which first brought the disturbing news to light. According to the NCA, these cash-to-crypto conversions are becoming a critical component of the global crime ecosystem. By enabling hackers to quickly convert their illicit profits into cryptocurrency, these operations ensure that funds reach their intended destinations in a timely manner, making it harder for law enforcement to trace and disrupt these activities.

Working in collaboration with law enforcement agencies from North America and Europe, the NCA led a coordinated effort to dismantle the infrastructure used by two major money-laundering gangs, known as TGR and Smart. These groups were linked to some of the most notorious cybercriminal networks in the world, including Evil Corp, Conti, Ryuk, and LockBit.

The operation, dubbed Operation Destabilize, resulted in the arrest of 45 suspected money launderers across the UK. In addition, investigators seized over $7.3 million in cash, a sum converted into pounds, which had been illicitly funneled through these criminal channels.

As part of the effort, the UK authorities also sanctioned both TGR and Smart, effectively blocking any funds they might try to send to Russia. While this was a significant blow to these groups, it wasn’t the end of the story.

Despite these efforts, the hackers adapted quickly. The money laundering gang behind the operation reportedly went on to acquire a bank called Keremet in Kyrgyzstan—a move that would allow them to continue funneling illicit funds directly to Russia. Rather than using traditional bank transfers, they began using “Stablecoin” cryptocurrency, a digital asset pegged to the Russian ruble, to facilitate these transactions. In doing so, they not only avoided the scrutiny of traditional financial institutions but also ensured the funds could continue to support Russia’s ongoing war with Ukraine.

This development highlights a glaring vulnerability in the sanctions imposed by Western nations. While countries like the US and UK have worked hard to stifle criminal activity through traditional financial channels, cybercriminals have found increasingly sophisticated ways to bypass these restrictions, turning cryptocurrency into a powerful tool for laundering illicit gains.

As ransomware attacks and cybercrime operations continue to evolve, it’s clear that global financial systems are struggling to keep up with these new methods of money laundering, further complicating efforts to disrupt criminal networks and halt their destructive activities.

Join our LinkedIn group Information Security Community!

Naveen Goud
Naveen Goud is a writer at Cybersecurity Insiders covering topics such as Mergers & Acquisitions, Startups, Cyber Attacks, Cloud Security and Mobile Security

No posts to display