Operation Destabilise, Authorities Dismateled Cybercriminals Money Laundering Network

In a major international operation codenamed “Operation Destabilise,” law enforcement agencies have successfully dismantled sophisticated Russian money laundering networks that served cybercriminals, drug traffickers, and sanctioned Russian elites worldwide.

The operation, led by the National Crime Agency (NCA), exposed two primary Russian-speaking networks known as Smart and TGR, which operated across the UK, Middle East, Russia, and South America. The U.S. Department of Treasury’s Office of Foreign Assets Control (OFAC) has imposed sanctions on the networks’ leadership and four associated businesses.

The complex scheme converted cryptocurrency to cash across multiple countries, enabling criminal groups to move illicit funds without physical border crossings. The networks collected funds in one location and made equivalent values available elsewhere, primarily through cryptocurrency exchanges.

Smart, headed by Ekaterina Zhdanova, and TGR, led by George Rossi and Elena Chirkinyan, facilitated the laundering of billions of dollars. In one notable case, Zhdanova laundered over $2.3 million in ransomware payments from the Ryuk cybercrime group, which had extorted at least £27 million from 149 UK victims, including hospitals, schools, and local authorities.

Free Webinar on Best Practices for API vulnerability & Penetration Testing:  Free Registration

The operation’s success has been substantial:

  • 84 arrests made
  • Over £20 million in cash and cryptocurrency seized
  • Operations disrupted across 30 countries
  • Multiple high-profile convictions, including courier network operators

Rob Jones, Director General of Operations at the NCA, emphasized the unprecedented nature of the operation: “For the first time, we have been able to map out a link between Russian elites, crypto-rich cyber criminals, and drugs gangs on the streets of the UK.”

The networks also helped Russian clients illegally bypass financial restrictions to invest in the UK. In one instance, Zhdanova collaborated with TGR members to move over £2 million into the UK for a Russian client, circumventing standard financial checks for property purchases.

The investigation revealed connections to Garantex, a sanctioned cryptocurrency exchange service linked to payments for components of weapons used in Russia’s invasion of Ukraine. The operation was conducted in collaboration with multiple international agencies, including the FBI, DEA, French Direction Centrale de la Police Judiciaire, and Irish An Garda Siochana.

Security Minister Dan Jarvis highlighted the operation’s significance: “This major global operation marks a significant step against economic crime,” adding that the UK and its allies will continue their efforts to combat illicit finance and related criminal activities.

Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar

The post Operation Destabilise, Authorities Dismateled Cybercriminals Money Laundering Network appeared first on Cyber Security News.

Tags

About Author

Chad Barr

Chad Barr is a visionary and executive leader, blending over two decades of expertise with a unique ability to demystify complex technical concepts. As a cybersecurity leader, prolific author, and director at AccessIT Group, Chad has empowered organizations across diverse industries to build resilient security frameworks. His engaging writing, speaking engagements, and thought leadership inspire proactive cybersecurity practices, making him a trusted voice in the ever-evolving digital landscape.

My Books

Cybersecurity News

  • Major Vulnerabilities Patched in SonicWall, Palo Alto Expedition, and Aviatrix Controllers
    by [email protected] (The Hacker News) on January 9, 2025 at 5:29 pm

    Palo Alto Networks has released software patches to address several security flaws in its Expedition migration tool, including a high-severity bug that an authenticated attacker could exploit to access sensitive data. “Multiple vulnerabilities in the Palo Alto Networks Expedition migration tool enable an attacker to read Expedition database contents and arbitrary files, as well as create and

  • 5 Benefits Of A Malware Sandbox For Business Security
    by Balaji N on January 9, 2025 at 5:27 pm

    Imagine an employee receiving an email that looks completely legitimate, maybe it’s a fake invoice or a shipping update. They click on the attachment, and just like that, your network could be infected with ransomware, sensitive customer data stolen, or your entire system brought to a halt. It’s a nightmare scenario, but one that happens The post 5 Benefits Of A Malware Sandbox For Business Security appeared first on Cyber Security News.

  • Rapid Cyber Incident Response: Why Speed, Quality, and the Right Tools Matter
    by Kaaviya Ragupathy on January 9, 2025 at 4:48 pm

    As you probably know by now, it doesn’t really matter how big in size your business is, you’re going to be up against the risk of cyberattacks in some form or another. These can range in scope and scale with threats such as ransomware and phishing campaigns right through insider threats and advanced persistent attacks. The post Rapid Cyber Incident Response: Why Speed, Quality, and the Right Tools Matter appeared first on Cyber Security News.

  • Criminal IP Launches Real-Time Phishing Detection Tool on Microsoft Marketplace
    by Kaaviya Ragupathy on January 9, 2025 at 4:32 pm

    Criminal IP, a globally recognized Cyber Threat Intelligence (CTI) solution by AI SPERA, has launched its Criminal IP Malicious Link Detector add-in on the Microsoft Marketplace. This cutting-edge tool provides real-time phishing email detection and URL blocking for Microsoft Outlook, adding an essential layer of email security in the face of increasing cyber threats. Generative AI advancements The post Criminal IP Launches Real-Time Phishing Detection Tool on Microsoft Marketplace appeared first on Cyber Security News.

  • New AI Challenges Will Test CISOs & Their Teams in 2025
    by Josh Lemos on January 9, 2025 at 3:00 pm

    CISOs need to recognize the new threats AI can present — while also embracing AI-powered solutions to stay ahead of those threats.

Categories