Executive Summary
Between 2018 and 2021, Artem Aleksandrovych Stryzhak, a Ukrainian national, orchestrated a series of targeted ransomware attacks against high-revenue organizations in the United States and Europe using the Nefilim ransomware strain. The attacks involved gaining unauthorized access to victim networks, exfiltrating sensitive data, and deploying custom ransomware executables, each with unique ransom notes and decryption keys. Victims included companies across multiple sectors such as engineering, aviation, chemicals, insurance, construction, and energy. Stryzhak, arrested in Spain in June 2024 and extradited to the U.S., pleaded guilty to conspiracy to commit fraud and faces up to 10 years in prison. His accomplice, Volodymyr Tymoshchuk, remains at large amid ongoing law enforcement efforts.
The incident underscores the operational sophistication of modern ransomware groups, particularly in tailoring attacks to maximize extortion and impact. With financial and reputational damages in the millions, this case highlights the persistent threat of ransomware and the necessity for robust east-west network security, multifactor identity controls, and anomaly detection across the enterprise attack surface.
Why This Matters Now
This case is a stark reminder of the evolving ransomware landscape, where threat actors increasingly target large organizations with tailored attacks and double extortion schemes. Ongoing investigations, extraditions, and record-breaking rewards for information on accomplices further demonstrate heightened global urgency to counter sophisticated cybercriminals and reinforce robust compliance controls.
Attack Path Analysis
The Nefilim ransomware attackers gained initial access to victim organizations’ networks, likely through phishing, compromised credentials, or exploiting remote services. After establishing a foothold, they escalated privileges to move laterally across internal environments, targeting sensitive systems and data stores. The attackers maintained communication with their infrastructure via encrypted or covert channels, enabling command and control. They then exfiltrated sensitive company data for extortion purposes, finally deploying custom ransomware to disrupt operations and encrypt critical resources, leading to ransom demands and threats to publish stolen data.
Kill Chain Progression
Initial Compromise
Description
Attackers likely obtained initial access via phishing, credential theft, or exploiting unprotected external services to infiltrate corporate networks.
Related CVEs
CVE-2019-19781
CVSS 9.8A vulnerability in Citrix Application Delivery Controller and Gateway allows remote code execution.
Affected Products:
Citrix Application Delivery Controller – 10.5, 11.1, 12.0, 12.1, 13.0
Citrix Gateway – 10.5, 11.1, 12.0, 12.1, 13.0
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Mapped techniques are for filtering and initial security operations; expansion to full STIX/TAXII data sets can be performed as needed.
Exploit Public-Facing Application
Valid Accounts
Phishing
Data Encrypted for Impact
Data Manipulation: Stored Data Manipulation
Data from Local System
Exfiltration Over C2 Channel
Inhibit System Recovery
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Use of Strong Access Controls
Control ID: 8.2.1
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA (Digital Operational Resilience Act) – ICT Risk Management Framework
Control ID: Article 10
CISA Zero Trust Maturity Model (ZTMM) 2.0 – Continuous Validation of Identity and Access
Control ID: Identity Pillar – Access Management
NIS2 Directive – Cybersecurity Risk Management and Governance
Control ID: Article 21
ISO/IEC 27001:2022 – Protection against malware
Control ID: A.8.7
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Aviation/Aerospace
Nefilim ransomware specifically targeted aviation companies in New York, requiring enhanced east-west traffic security and encrypted communications to prevent lateral movement and data exfiltration.
Chemicals
Chemical companies in Ohio were directly victimized by Nefilim attacks, necessitating zero trust segmentation and threat detection capabilities to protect industrial automation systems and processes.
Insurance
Insurance sector faces dual risk as both Nefilim ransomware targets and coverage providers, requiring multicloud visibility and egress security to protect sensitive policyholder data.
Construction
Construction companies were specifically targeted by Ukrainian cybercriminals using customized ransomware, highlighting need for kubernetes security and anomaly detection in project management systems.
Sources
- Ukrainian national pleads guilty to Nefilim ransomware attackshttps://cyberscoop.com/nefilim-ransomware-artem-stryzhak-guilty-plea/Verified
- Nefilim Ransomware Uses Citrix Vulnerability to Compromise Victims’ Machineshttps://www.acronis.com/en-us/cyber-protection-center/posts/nefilim-ransomware-uses-citrix-vulnerability-to-compromise-victims-machines/Verified
- Ukrainian National Pleads Guilty to Conspiracy to Use Nefilim Ransomware to Attack Companies in the United States and Other Countrieshttps://www.justice.gov/opa/pr/ukrainian-national-pleads-guilty-conspiracy-use-nefilim-ransomware-attack-companies-unitedVerified
- Nefilim Ransomware Targets Victims with $1 Billion Revenuehttps://newsroom.trendmicro.com/2021-06-08-Nefilim-Ransomware-Targets-Victims-with-1-Billion-RevenueVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Comprehensive CNSF controls including zero trust segmentation, east-west traffic visibility, egress policy enforcement, and inline threat detection would have severely limited the Nefilim ransomware group's ability to move laterally, exfiltrate data, and deliver ransomware payloads. Proactive network segmentation and anomaly detection provide critical defenses to identify, limit, and stop multi-stage ransomware attacks within hybrid and multi-cloud environments.
Control: Cloud Firewall (ACF)
Mitigation: Prevents unauthorized inbound connections to critical services.
Control: Zero Trust Segmentation
Mitigation: Limits the blast radius by enforcing least-privilege and granular access between workloads.
Control: East-West Traffic Security
Mitigation: Detects and blocks suspicious internal movement between workloads and services.
Control: Inline IPS (Suricata)
Mitigation: Detects and blocks malicious C2 connections and known bad payloads in real time.
Control: Egress Security & Policy Enforcement
Mitigation: Blocks unauthorized outbound data transfers and flags anomalous egress activity.
Rapidly detects suspicious encryption and ransomware indicators for faster response.
Impact at a Glance
Affected Business Functions
- Operations
- Finance
- Customer Service
Estimated downtime: 7 days
Estimated loss: $5,000,000
Sensitive corporate data, including financial records and customer information, was exfiltrated and threatened to be published unless ransom demands were met.
Recommended Actions
Key Takeaways & Next Steps
- • Enforce zero trust segmentation and dynamic workload isolation to minimize lateral movement opportunities.
- • Deploy inline IPS and anomaly detection to identify and block exploit attempts and C2 traffic across all environments.
- • Apply rigorous egress policy controls and traffic observability to quickly detect and prevent data exfiltration.
- • Integrate cloud-native firewalling to reduce external attack surface and tightly control inbound/outbound access.
- • Continuously monitor internal traffic flows and respond to policy violations or abnormal activity with automated incident response.



