Moscow man accused of posing as FSB officer to extort Conti ransomware gang
好,我现在要帮用户总结这篇文章的内容,控制在100字以内。首先,我需要通读整篇文章,抓住主要信息。 文章讲的是莫斯科居民Ruslan Satuchin被指控冒充俄罗斯联邦安全局官员,试图向Conti勒索软件集团敲诈钱财。他声称有影响力,可以阻止对Conti的刑事起诉。这个计划从2022年9月开始,他联系了Conti的成员。Satuchin否认指控,目前被拘留,可能面临10年监禁和罚款。 接下来,我需要提取关键点:莫斯科居民、冒充FSB官员、敲诈Conti、计划开始时间、否认指控、拘留情况、可能的刑罚。 然后,把这些信息浓缩成100字以内的句子,确保内容准确且简洁。 最后,检查是否符合用户的要求:不用特定开头词,直接描述内容。 </think> 莫斯科男子Ruslan Satuchin被指控冒充俄罗斯联邦安全局官员试图向Conti勒索软件集团敲诈钱财。他声称能阻止对Conti的刑事起诉。该计划始于2022年9月。Satuchin否认指控,并被拘留等待审判。若定罪,他将面临10年监禁和罚款。 2026-2-25 11:31:0 Author: therecord.media(查看原文) 阅读量:4 收藏

A Moscow resident has been accused of trying to extort money from the notorious Conti ransomware group by posing as an officer of Russia’s Federal Security Service (FSB), according to local media reports.

Russian outlet RBC, citing sources familiar with the investigation, reported on Wednesday that the suspect, Ruslan Satuchin, allegedly presented himself as an FSB officer and demanded a large payment from Conti members in exchange for avoiding criminal prosecution.

The scheme allegedly began in September 2022, when Satuchin contacted one of Conti’s members and claimed to have influence over law enforcement activities targeting the group, the sources said.

Satuchin denies wrongdoing. He is being held in pre-trial detention in Moscow after a criminal case was formally opened in September 2025. Police said he could interfere with witnesses if released. Defense lawyers requested house arrest, citing his family ties and saying he made no attempt to flee despite knowing about the investigation.

If convicted, he could face up to 10 years in prison and a fine of up to 1 million rubles ($13,000).

Conti was one of the most active ransomware operations before shutting down in 2022. Cybersecurity researchers have linked the group to Russian-speaking cybercriminals and to attacks targeting governments, healthcare providers, schools and critical infrastructure worldwide.

Two coordinated tranches of sanctions by the United States and the United Kingdom in February and September 2023 publicly named members of the Conti/Ryuk ransomware network and linked them to the wider Trickbot cybercrime infrastructure.

The gang fractured following a major leak in early 2022, when a person claiming pro-Ukraine sympathies published internal Conti chat logs, source code and infrastructure documents after the group publicly backed Russia’s invasion of Ukraine.

Security researchers have said that while Conti as a brand disappeared, former members regrouped under new ransomware operations, including Royal, Black Basta and Akira.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.


文章来源: https://therecord.media/moscow-man-accused-of-extorting-conti-gang
如有侵权请联系:admin#unsafe.sh