Finance & Banking,
Fraud Management & Cybercrime,
Industry Specific
French Authorities Arrest Alleged Ryuk Money Launderer Ekatarina Zhdanova
A major law enforcement investigation, spearheaded by the United Kingdom, has dismantled two Russian cash-for-crypto money laundering networks, resulting in the arrest of 84 individuals and the imposition of U.S. sanctions on several others. The initiative, identified as “Operation Destabilize,” highlights the growing intersection of organized crime and cryptocurrency.
The networks, named “Smart” and “TGR,” were reportedly responsible for laundering billions of dollars annually, primarily using cryptocurrency as a conduit. According to the U.K. National Crime Agency (NCA), these operations involved channeling illicit cash generated by British criminals into international business accounts, where payments were then made to the criminals in cryptocurrency. This scheme enabled Russian individuals, whose access to the international financial system has been curtailed due to sanctions stemming from the conflict in Ukraine, to bypass these restrictions.
The NCA revealed the extensive reach of these networks, which spanned the globe, including areas such as the U.K., Middle East, Russia, and South America. Their findings underscored an alarming link between cybercriminals, Russian oligarchs, and street gangs in the U.K., which for years had been opaque to investigators.
As part of the operation, authorities seized cash and cryptocurrency valued at approximately 20 million pounds. The NCA noted, “For the first time, we have been able to draw a connection between Russian elites, crypto-wealthy criminals, and street gangs operating in the U.K.,” emphasizing the opaque nature of the networks until now.
Ekaterina Zhdanova, a Russian national identified as the alleged leader of the Smart operation, was detained in France. She had previously come under U.S. Department of the Treasury sanctions in November 2023 due to her involvement in laundering sums allegedly linked to ransomware group Ryuk. Law enforcement sources claim Zhdanova facilitated the movement of $2.3 million in ransomware payments associated with a Ryuk affiliate. The NCA highlighted ransomware as one of the most pressing cybercrime threats against national security in the U.K.
In addition to Zhdanova’s arrest, recent U.S. sanctions also targeted a Ukrainian national believed to control TGR, along with two Russian associates, Khadzi-Murat Dalgatovich Magomedov and Nikita Vladimirovich Krasnov. The sanctions extended to four TGR subsidiaries operating in the U.K., Russia, Thailand, and the United Arab Emirates, all of which provided a range of illicit services, including cryptocurrency trading and equipment shipping.
British authorities maintained that the U.K. served as a critical hub for these money laundering operations. Criminal groups relied on swift cash transactions complemented by immediate cryptocurrency exchanges—a tactic that enables them to evade traditional financial scrutiny. Notably, one operation reported cash exchanges occurring in 55 distinct locations across the U.K.
In an insightful comment, the NCA noted, “Upon receiving payments in cryptocurrency for cash, these gangs would reinvest in their unlawful activities, enabling the procurement of more drugs or weapons while avoiding the complexities of cross-border cash movement.” Amid this crackdown, the police arrested seven individuals affiliated with the networks. Among them were Semen Kuksov and Andrii Dzektsa, who were responsible for managing cash couriers and admitted to laundering over 12 million pounds within a short 74-day period. They have since been sentenced to five years and seven months following the confiscation of significant cryptocurrency assets.
As this situation unfolds, business owners and stakeholders in the tech sector must remain vigilant regarding the evolving tactics of cybercriminals. The incident highlights the potential integration of tactics characteristic of the MITRE ATT&CK framework, including initial access via criminal partnerships, persistence through established network connections, and the sophisticated means of laundering funds that leverage both traditional and digital financial systems. Understanding such tactics is critical in building robust defenses against increasingly complex cyber threats.