In Other News

Airplane Crash into Portage River

ERIE TOWNSHIP – The Ohio State Highway Patrol is investigating a minor injury plane crash that occurred on September 30, 2023, at approximately 4:13 P.M. The plane crashed into the Portage River near 4640 W. Harbor Rd in Ottawa County.

Pilot: James Raymond Lenardson, age 72, of Bonita Springs, Florida was operating a 2003 Cessna 206 seaplane. Mr. Lenardson sustained minor injuries as a result of the crash. He was transported by Port Clinton EMS to Magruder Hospital in Port Clinton, Ohio.

Passenger: Leo Joseph Eggert Jr, age 67, of Perrysburg, Ohio was a passenger in the plane. Mr. Eggert sustained minor injuries and was transported by Port Clinton EMS from the scene to Magruder Hospital in Port Clinton, Ohio.

Details of Crash: Mr. Lenardson was traveling eastbound on the Portage River attempting to take off. As Mr. Lenardson began his initial accent, he struck a power line. The plane lost control and crashed into the Portage River. Both Mr. Lenardson and Mr. Eggert were able to exit the plane as it began to sink. Mr. Lenardson and Mr. Eggert were able to get to shore. An Ohio Edison high voltage power line was knocked down with part laying in the river and another across a cottage at The Resort at Erie Landing. Ohio Edison responded to the scene to de-energize the power line. Rescue Marine was contacted to retrieve the plane from the river.

Alcohol and/or drug use are not believed to be a factor at this time. The crash remains under investigation.

The Ohio State Highway Patrol was assisted on the scene by the Ottawa County Sheriff’s Office, Erie Township Fire, Port Clinton EMS, Ohio Edison, FAA, and the NTSB.

Governor DeWine Issues Statement on Potential Federal Government Shutdown

(COLUMBUS, Ohio)— Governor Mike DeWine issued the following statement on the possibility of a federal government shut down at midnight tonight and its potential effect on Ohioans.

“Today many Ohioans are anxious about the potential of a federal government shut down and what it may mean to them.

 

“I want to assure Ohioans that we have been monitoring the situation closely, and have been working to prepare for a potential shut down. We have made contingency plans to ensure that our state programs that receive significant federal funding will operate as normal for the coming weeks. This includes benefit programs such as WIC, SNAP, and TANF that provide food and other resources for Ohio families. Ohioans will have the benefits that they rely on.

“However, as I said earlier in the week, I encourage the U.S. Congress to work toward a swift resolution.”

New Central Ohio Crime Gun Intelligence Center Opens in Columbus

Free evidence analysis and investigative support now available for Central Ohio law enforcement agencies.

(COLUMBUS, Ohio)—Ohio Governor Mike DeWine joined state, local, and federal leaders in Columbus to unveil the new Central Ohio Crime Gun Intelligence Center (CGIC).

Housed within the Ohio Department of Public Safety, the Central Ohio CGIC is operated in partnership between the Columbus Division of Police, Ohio State Highway Patrol, Ohio Narcotics Intelligence Center, Ohio Attorney General’s Bureau of Criminal Investigation, and U.S. Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF). This centralized law enforcement hub, which focuses exclusively on investigating and preventing gun violence, combines the expertise of firearm evidence examiners, intelligence analysts, and investigators under one roof to rapidly collect, analyze, and share information about guns used in violent crimes.

“The new Central Ohio Crime Gun Intelligence Center represents the next generation in intelligence-based policing, and it is unlike anything that has ever been done in Central Ohio before,” said Governor DeWine. “The teams taking part in this large-scale and long-term collaboration are sharing everything from intelligence and investigative leads to technology and manpower so that they can zero in on the people who are shooting and killing others without remorse. Gun violence is about to become much, much harder to get away with in Central Ohio.”

The centerpiece of the Central Ohio CGIC is the National Integrated Ballistic Information Network (NIBIN), which was developed by the ATF to help law enforcement connect gun crimes nationwide. The Ohio State Highway Patrol is dedicating two NIBIN machines to the CGIC that will create digital images of shell casings connected to criminal investigations and compare them to firearm evidence from other crimes. A match indicates that the same firearm may have been used in multiple shootings, and law enforcement can use this information as an investigative lead.

“As ATF Director Steve Dettelbach and I announced in January, the Crime Gun Intelligence Center is precisely what we need to further empower our officers to capture and prosecute those responsible for perpetrating gun violence in our communities,” said City of Columbus Mayor Andrew J. Ginther. “This is about tapping into the power of collaboration to strengthen accountability and secure justice – using our combined resources to connect the guns being used to kill, maim, and commit crimes with the individuals who wield or peddle them in the first place.”

The Central Ohio CGIC began operations in July and is available to assist law enforcement agencies throughout the region free of charge. Since its initial launch, teams have connected numerous guns to crimes that were committed both recently and several years ago.

“ATF’s Crime Gun Intelligence Centers around the country use data, science, and crime gun evidence to support the investigation and prosecution of violent criminals,” stated Daryl S. McCormick, Special Agent in Charge of ATF’s Columbus Field Division. “We look forward to working with our law enforcement partners to expand existing efforts in Central Ohio to use these resources to make our communities safer through targeting and prosecuting the users and the sources of crime guns.”

“Crime Gun Intelligence Centers succeed when NIBIN technology is leveraged by law enforcement agencies working together to pinpoint and stop criminals who illegally use guns on our streets,” Ohio Attorney General Dave Yost said. “This is a path forward all political parties can agree will reduce gun violence in our communities.”

Additional agencies that will support the Central Ohio CGIC include the Franklin County Sheriff’s Office, Franklin County Prosecutor’s Office, and U.S. Attorney’s Office for the Southern District of Ohio.

“The center represents a crucial step forward in our efforts to combat gun violence in our community. With this ground-breaking technology and collaboration with local agencies, we’ll be able to make a real impact in reducing gun crime and help victims and their families find justice,” said Franklin County Sheriff Dallas Baldwin “Concentrated, collaborative efforts like this CGIC can have a real impact on reducing the level of violence in our cities,” said U.S. Attorney Kenneth L. Parker. “Federal firearms laws can be punished by up to 10 years in prison. We will not hesitate to use those laws when appropriate to hold accountable those who use firearms to commit acts of violence in our communities.”

The Central Ohio CGIC is now the second full-scale crime gun intelligence center in the state, joining the center operated by the Cincinnati Police Department. The two new NIBIN machines dedicated to the Central Ohio CGIC were funded as part of Governor DeWine’s Ohio Ballistics Testing Initiative, which was announced in March 2022. A total of $10.5 million was awarded to the Ohio Attorney General’s Bureau of Criminal Investigation and the Ohio State Highway Patrol to increase the number of NIBIN units in Ohio from seven to 16.

Other assistance for first responders developed by the DeWine-Husted Administration includes the creation of the Ohio Narcotics Intelligence Center, Ohio School Safety Center, Ohio Office of Law Enforcement Recruitment, Ohio Office of First Responder Wellness, Ohio Prisoner Extradition Reimbursement Program, Ohio Body-Worn Camera Program, Ohio Crime Lab Efficiency Program, Ohio Violent Crime Reduction Program, Ohio First Responder Recruitment, Retention, and Resilience Program, Ohio Court Backlog Reduction Program, Community Violence Prevention Grant Program, and the new eWarrant database.

Governor DeWine Announces Program to Enhance Support for Human Trafficking Survivors

(COLUMBUS, Ohio)— Ohio Governor Mike DeWine today announced details of a new program to help victim service agencies meet the needs of survivors of human trafficking.

The new Direct Services for Victims of Human Trafficking Grant Program was created by Governor DeWine and the Ohio General Assembly as part of Ohio’s new operating budget. A total of $4 million in funding is now available for nonprofit organizations to help them adequately serve the growing number of sex and labor trafficking victims in need of support.

“As awareness of human trafficking grows, the number of identified victims also increases, so it is absolutely critical that our local service programs have enough resources,” said Governor DeWine. “This infusion of grant funding will help ensure that support for trafficking victims is widely available.”

The Ohio Department of Public Safety’s Office of Criminal Justice Services (OCJS) opened the application period for the grant program today. Direct services that are eligible for funding include but are not limited to mental health services, substance use disorder treatment, education and employment support, and residential placement. Awards are expected to be announced in January 2024.

In total, $9 million in funding was dedicated to combating human trafficking in Ohio’s new operating budget. This historic investment will also be used toward additional local and statewide projects and to expand the Governor’s Human Trafficking Task Force, which prioritizes a holistic approach to responding to human trafficking by identifying gaps in prevention, victim services, and prosecution.

“We appreciate Governor DeWine and the Ohio General Assembly for recognizing the need for expanded victim services throughout the state,” said Maria Busch, state anti-trafficking coordinator for the Governor’s Human Trafficking Task force. “Those who’ve been subject to human trafficking have unique needs and often require several levels of support to move forward, and this investment will make a significant difference in helping survivors take back control of their lives.”

Nonprofit organizations that provide direct support to victims of trafficking and/or those considered at high risk of trafficking will be eligible for grant funding. Priority consideration will be awarded to applicants who demonstrate evidence-based and survivor-informed programming.

Applicants must submit proposals online through the Online Grants Management System by 5 p.m. EST on Nov. 8.

A bidders training webinar for potential applicants will be held on Tuesday, October 3, at 9:30 a.m. The training is not mandatory but will provide helpful information on both the application preparation and review process. Nonprofit organizations with questions should contact the State Anti-Trafficking Coordinator at SAHTC@info.dps.ohio.gov.

Nurse Impostor Charged In Multi-Count Federal Indictment

Leticia Gallarzo used the identity of a real nurse to obtain employment as a registered nurse

GRAND RAPIDS, MICHIGAN — U.S. Attorney for the Western District of Michigan Mark Totten today announced that a federal grand jury returned an indictment charging Leticia Gallarzo, 48, of Allegan County, with wire fraud, two counts of aggravated identity theft, two counts of making false statements in medical records affecting health care benefit programs, and production of a false identification document, all charges relating to her scheme to defraud employers by posing as a registered nurse.

“These allegations that Ms. Gallarzo faked her qualifications as a licensed medical professional are highly concerning and potentially put innocent patients at risk,” said U.S. Attorney Mark Totten. “My office takes this threat to the public very seriously and thanks our law enforcement partners for their investigative work in this case.”

If convicted, Gallarzo faces a maximum sentence of up to 20 years in prison for wire fraud and two years mandatory imprisonment for aggravated identity theft, to be served consecutively to the underlying sentence.

According to allegations in the indictment and a previously filed criminal complaint, Gallarzo used the Michigan licensing number and the name of a person licensed as a nurse to obtain employment as a registered nurse at two different locations: an area nursing home and a hospice facility.

Gallarzo did not possess a valid nursing license and represented that she earned a master’s degree in nursing from The George Washington University and a bachelor’s degree in nursing from Davenport University, despite not having a degree of any kind in nursing. Gallarzo produced a counterfeit Michigan nursing license that was also used to obtain employment with the hospice facility.

The hospice facility learned that Gallarzo was a nurse impostor when her fingerprints matched the fingerprints on record due to her previous state and federal convictions for practicing nursing without a license in Texas in 2015 and 2016. The Michigan State Police arrested Gallarzo shortly thereafter.

“As alleged in this case, the defendant recklessly and willingly put the lives of innocent patients at risk,” said Cheyvoryea Gibson, Special Agent in Charge of the FBI in Michigan. “The FBI remains committed to ensuring identity theft cases like this one are thoroughly investigated. I would like to extend a special thank you to the Michigan State Police for their outstanding work and support throughout this case.”

“The defendant’s alleged actions demonstrate blatant disregard for the safety and well-being of those under her purported care,” said Mario M. Pinto, Special Agent in Charge with the U.S. Department of Health and Human Services, Office of Inspector General (HHS-OIG). “To ensure that patients receive appropriately qualified services, HHS-OIG will steadfastly pursue those who misrepresent their medical qualifications.”

The Federal Bureau of Investigation Grand Rapids Field Office and U.S. Health and Human Service Office of Inspector General are investigating the case. Assistant U.S. Attorney Ron Stella is prosecuting the case.

The charges in an indictment are merely accusations, and a defendant is presumed innocent until and unless proven guilty in a court of law.

Governor DeWine Issues Reprieve

(COLUMBUS, Ohio)— Ohio Governor Mike DeWine issued the following reprieve of execution:

  • Scott Group, who was scheduled to be executed on January 10, 2024. The new date of execution has been moved to February, 2027.

Governor DeWine is issuing this reprieve due to ongoing problems involving the willingness of pharmaceutical suppliers to provide drugs to the Ohio Department of Rehabilitation and Correction (DRC), pursuant to DRC protocol, without endangering other Ohioans.

State Highway Patrol Investigating Fatal Crash

Peru Township – The Ohio State Highway Patrol’s Norwalk Post is currently investigating a one vehicle, fatal crash that occurred today, September 25, 2023 at approximately 4:21 P.M. The crash occurred on Snyder Road west of State Route 61, Peru Township, Huron County.

Shirley McQuillen, age 81, from Willard, Ohio was driving a 2016 red, Ford Escape east on Snyder Road. Ms. McQuillen traveled off the right side of the roadway striking fence posts and a tree before overturning.

Ms. McQuillen was not wearing her seatbelt and was trapped inside the vehicle. She was extricated by non-mechanical means by the Huron River Joint Fire District. Ms. McQuillen sustained fatal injuries as a result of the crash.

Drugs and/or alcohol do not appear to be a factor in the crash, which remains under investigation.

The Ohio State Highway Patrol was assisted on scene by the Huron River Joint Fire District, North Central EMS, Huron County Coroner, Metro LifeFlight, and Interstate Towing.

AG Yost Pushes Back on Federal Censorship of Free Speech

(COLUMBUS, Ohio) — Ohio Attorney General Dave Yost has filed an amicus brief urging the U.S. Supreme Court to block the Biden administration from censoring protected speech on social media.

“The federal government doesn’t get to play referee on the field of public discourse,” Yost said. “If you let them decide what speech is OK, one day yours might not be.”

In the filing, Yost asks the Supreme Court to deny the federal government’s request to pause a U.S. District Court injunction prohibiting certain Biden administration officials from pressuring social media platforms into deleting user content protected by the First Amendment.

The brief argues that halting the injunction would enable the executive branch to resume its troubling practice of silencing individuals and groups with views opposing those of the current administration — a federal overreach that was on full display following the outbreak of the coronavirus.

During the pandemic, the White House closely monitored social media platforms, flagging accounts and posts with dissenting views for the platforms to delete. Officials also kept tabs on the platforms’ monitoring activities and pressured the companies to adopt permanent policy changes aligned with the federal government’s goals. Similar steps were taken by the Surgeon General and the Centers for Disease Control and Prevention, among others.

Missouri and Louisiana sued last year, arguing in Missouri v. Biden that the federal government’s censorship of social media content violated the First Amendment. The U.S. Court of Appeals for the Fifth Circuit agreed, ruling against the federal government earlier this month and partly upholding an injunction granted by a U.S. District Court in Louisiana.

Yost writes in support of the plaintiffs, saying, “The facts underlying this case reflect the federal government’s tendency to wield its power to target people and speech specially disfavored by those in power.”

A copy of the amicus brief is available on the attorney general’s website.

Chinese National Admits to Trafficking Counterfeit Target Gift Cards

EAST ST. LOUIS, Ill. – A woman originally from China admitted involvement in counterfeit gift card scheme directed at Target shoppers across the Midwest, after she pled guilty to the federal crime in a U.S. District courtroom in East St. Louis on Thursday.

Hongying Wang, 53, originally of Hunan Province, China, admitted guilt to using and trafficking in a counterfeit access device. For the charge, Wang faces a statutory maximum of ten years imprisonment and a fine of up to $250,000.

“Protecting consumers from fraud is a familiar battle, but individuals deliberately placing fake gift cards onto sales racks with the intention of stealing the funds from patrons is a new low, and I applaud the law enforcement officials who are investigating this case,” said U.S. Attorney Rachelle Aud Crowe.

“Fraud is often mistaken for a victimless crime but when individuals like Wang commit these types of crimes, they are most certainly victimizing consumers and businesses,” said Special Agent in Charge of the HSI Chicago Area of Operations Sean Fitzgerald. “HSI works daily to protect our community from these individuals by partnering with our local and federal partners to not only keep these counterfeit products out of the hands of unsuspecting consumers, but to also hold accountable those who attempt to profit from scamming the public.”

“The Illinois State Police is committed to stopping trafficking, whether it is trafficking in guns, drugs, or in this case – counterfeit goods,” said Illinois State Police Director Brendan F. Kelly.

According to court documents, the scheme involved individuals placing altered gift cards on the sales racks at Target while retaining the access numbers. Once a gift card was loaded with money by an unsuspecting patron, the fraudsters would have the codes needed to steal the funds.

In January 2023, a Target security officer observed Wang and a co-defendant placing gift cards onto the racks in the Belleville store for customers to purchase. Upon further review, the gift cards were altered with the codes scratched off and covered by stickers to appear untouched.

In addition to Belleville, the following Target locations across the Midwest were knowingly affected by the scheme: Albuquerque, New Mexico; Norman, Oklahoma; Edmond, Oklahoma; Liberty, Missouri; Independence, Missouri; St. Peters, Missouri; Town and Country, Missouri; and Brentwood, Missouri.

If you believe you are a victim, contact the U.S. Attorney’s Office by emailing: USAILS.VW_ILS@usdoj.gov. Please provide your full name, mailing address, telephone number, and email address.

Wang admitted to possessing 6,100 fake gift cards with intent to place on the shelves.

Guangwei Gao, also of China, was named and charged in the indictment with one count of using and trafficking in a counterfeit access device.

An indictment is a formal charge against a defendant. Under the law, a defendant is presumed to be innocent of a charge until proved guilty beyond a reasonable doubt to the satisfaction of a jury.

Wang’s sentencing is set for 10:30 a.m. on Jan. 22, 2024, at the federal courthouse in East St. Louis.

Homeland Security Investigations (HSI) and the Illinois State Police (ISP) are leading the investigation, and Assistant U.S. Attorney Peter T. Reed is prosecuting the case.

Foreign Nationals Charged in Connection with Trickbot Malware and Conti Ransomware Conspiracies

Multiple Foreign Nationals Charged in Connection with Trickbot Malware and Conti Ransomware Conspiracies

WASHINGTON – Three indictments in three different federal jurisdictions have been unsealed charging multiple Russian cybercrime actors involved in the Trickbot malware and Conti ransomware schemes.

According to court documents and public reporting, Trickbot, which was taken down in 2022, was a suite of malware tools designed to steal money and facilitate the installation of ransomware. Hospitals, schools, and businesses were among the millions of Trickbot victims who suffered tens of millions of dollars in losses. While active, Trickbot malware, which acted as an initial intrusion vector into victim computer systems, was used to support various ransomware variants, including Conti. Conti was a ransomware variant used to attack more than 900 victims worldwide, including victims in approximately 47 states, the District of Columbia, Puerto Rico, and approximately 31 foreign countries. According to the FBI, in 2021, Conti ransomware was used to attack more critical infrastructure victims than any other ransomware variant.

“The Justice Department has taken action against individuals we allege developed and deployed a dangerous malware scheme used in cyberattacks on American school districts, local governments, and financial institutions,” said Attorney General Merrick B. Garland. “Separately, we have also taken action against individuals we allege are behind one of the most prolific ransomware variants used in cyberattacks across the United States, including attacks on local police departments and emergency medical services. These actions should serve as a warning to cybercriminals who target America’s critical infrastructure that they cannot hide from the United States Department of Justice.”

“Today’s announcement shows our ongoing commitment to bringing the most heinous cyber criminals to justice – those who have devoted themselves to inflicting harm on the American public, our hospitals, schools, and businesses,” said FBI Director Christopher Wray. “Cyber criminals know that we will use every lawful tool at our disposal to identify them, tirelessly pursue them, and disrupt their criminal activity. We, alongside our federal and international partners, will continue to impose costs through joint operations no matter where these criminals may attempt to hide.”

“The defendants charged in these three indictments across three different jurisdictions allegedly used their cyber knowledge and capabilities to victimize people and businesses around the world without regard for the damage they caused,” said Acting Assistant Attorney General Nicole M. Argentieri of the Justice Department’s Criminal Division. “These indictments should serve as a reminder that no matter a cybercriminal’s location, we will identify and pursue them by doing everything in our power to ensure they face the consequences of their actions.”

“Conti ransomware was used to exploit our financial systems and target hundreds of innocent victims,” said Special Agent in Charge William Mancino of the U.S. Secret Service’s Criminal Investigative Division. “The Secret Service will continue to work with our local, state, and federal law enforcement partners to investigate cybercriminals and bring offenders to justice.”

As detailed below, a federal grand jury in the Northern District of Ohio returned an indictment charging Maksim Galochkin, aka Bentley; Maksim Rudenskiy, aka Buza; Mikhail Mikhailovich Tsarev, aka Mango; Andrey Yuryevich Zhuykov, aka Defender; Dmitry Putilin, aka Grad and Staff; Sergey Loguntsov, aka Begemot and Zulas; Max Mikhaylov, aka Baget; Valentin Karyagin, aka Globus; and Maksim Khaliullin, aka Maxfax, Maxhax, and Kagas, all Russian nationals, with conspiring to use the Trickbot malware to steal money and personal and confidential information from unsuspecting victims, including businesses and financial institutions located in the United States and around the world, beginning in November 2015.

A federal grand jury in the Middle District of Tennessee returned an indictment charging Galochkin, Rudenskiy, Tsarev, and Zhuykov with conspiring to use Conti ransomware to attack businesses, nonprofits, and governments in the United States beginning in 2020 and continuing through June 2022.

A federal grand jury in the Southern District of California returned an indictment charging Galochkin in connection with the Conti ransomware attack on Scripps Health on May 1, 2021.

Northern District of Ohio

The indictment returned in the Northern District of Ohio charged all nine defendants for their alleged roles in developing, deploying, managing, and profiting from the malware known as Trickbot. Trickbot was a sophisticated, modular, multi-functional suite of malware tools which (a) infected victims’ computers with malware designed to capture victims’ online banking login credentials; (b) obtained and harvested other personal identification information, including credit cards, emails, passwords, dates of birth, social security numbers, and addresses; (c) infected other computers connected to the victim computer; (d) used the captured login credentials to fraudulently gain unauthorized access to victims’ online bank accounts at financial institutions; (e) stole funds from victims’ bank accounts and laundered those funds using U.S. and foreign beneficiary bank accounts provided and controlled by the defendants and co-conspirators; and (f) installed ransomware on victim computers.

“As alleged in the indictment, Trickbot infected millions of computers worldwide, including those used by hospitals, schools, and businesses,” said U.S. Attorney Rebecca C. Lutzko for the Northern District of Ohio. “Today’s announcement demonstrates that these dangerous cybercriminals are not anonymous, as they once believed. The indictments unsealed today show the resolve of the international community to work together to bring cybercriminals to justice. We will continue to use all resources at our disposal to stop cybercrime.”

Each defendant is charged with one count of conspiracy to violate the Computer Fraud and Abuse Act, one count of wire fraud conspiracy, and one count of conspiracy to launder the proceeds of the scheme. The indictment also included an enhancement for falsely registering domains. If convicted, each defendant faces a maximum penalty of 62 years in prison.

Trickbot malware developers Alla Witte and Vladimir Dunaev were previously indicted and apprehended. Witte, a Latvian national pleaded guilty to conspiracy to commit computer fraud and was sentenced to 32 months in June 2023. Dunaev, a Russian national, currently is in custody and pending trial in Cleveland.

Middle District of Tennessee

The Middle District of Tennessee indictment charges that the individuals behind Conti ransomware, including Galochkin, Rudenskiy, Tsarev, and Zhuykov, conspired to use Conti to attack hundreds of victims. Conti’s victims included hospital systems, local governments, and foreign governments. Conti conspirators allegedly extorted funds from victims in the Middle District of Tennessee and encrypted the computer systems of a local sheriff’s department, a local police department, and local emergency medical services, among others. Ransom notes left on Conti victims’ computer systems typically boasted “if you don’t [know Conti] – just ‘google it.’”

“The conspirators who developed and deployed Conti ransomware victimized businesses, governments, and non-profits around the world, including a sheriff’s office and an emergency medical service in Tennessee,” said U.S. Attorney Henry C. Leventis for the Middle District of Tennessee. “We will continue to use the full power of this office to ensure that hackers can no longer hide behind their computer screens and to hold them accountable.”

Galochkin was a “crypter” for Conti, modifying the ransomware so that it would not be detected by anti-virus programs; Rudenskiy was a developer who supervised other Conti developers; Tsarev was a manager of other Conti conspirators; and Zhuykov was a systems administrator who managed users of Conti infrastructure, organized and paid for infrastructure and tools, and assisted in problem solving infrastructure-related issues.

Galochkin, Rudenskiy, Tsarev, and Zhuykov are each charged with one count of conspiracy to violate the Computer Fraud and Abuse Act and one count wire fraud conspiracy. If convicted, each defendant faces a maximum penalty of 25 years in prison.

Southern District of California

As alleged in the Southern District of California indictment, Galochkin caused the transmission of the Conti malware and impaired the medical examination, diagnosis, treatment, and care of one or more individuals.

Galochkin is charged with three counts of computer hacking. If convicted, he faces a maximum penalty of 20 years in prison.

“The indictment alleges a callous disregard for the medical care and the personal information of residents of the Southern District of California,” said Acting U.S. Attorney Andrew R. Haden for the Southern District of California. “This office is committed to protecting victims of cybercrime and holding perpetrators accountable.”

The FBI Cleveland Field Office is leading the investigation into Trickbot malware.

Assistant U.S. Attorneys Daniel Riedl and Duncan Brown for the Northern District of Ohio and Senior Counsel Candina Heath of the Criminal Division’s Computer Crime and Intellectual Property Section are prosecuting the Trickbot malware case.

The FBI San Diego, Memphis, and El Paso Field Offices, with U.S. Secret Service, are leading the investigation into Conti ransomware. The U.S. Attorney’s Office for the Western District of Texas provided significant assistance.

Assistant U.S. Attorney Taylor J. Phillips for the Middle District of Tennessee, Assistant U.S. Attorneys Jonathan Shapiro and Kareem Salem for the Southern District of California, and Trial Attorney Sonia V. Jimenez and Senior Counsel Ryan K.J. Dickey of the Criminal Division’s Computer Crime and Intellectual Property Section are prosecuting the Conti ransomware cases.

The Justice Department’s National Security Division provided significant assistance in the Conti ransomware and Trickbot malware investigations.

An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

Northern District of Ohio indictment

Middle District of Tennessee indictment

Southern District of California indictment

ASHLAND WEATHER