Conti-Akira Ransomware Negotiator Sentenced to 102 Months in U.S. Prison
A high-level ransomware negotiator linked to the Conti and Akira operations has been sentenced to 102 months in federal prison for extorting over 53 companies…

“With this sentence, a cruel, ruthless, and dangerous international cybercriminal is now behind bars.” These were the words of the federal court as it sentenced Deniss Zolotarjovs, a 35-year-old Moscow-born Latvian negotiator, to 102 months in prison. The sentence fell 24 months short of the 126 requested by the Department of Justice for his role as an affiliate in a Russia-based ransomware syndicate.
Editorial Note: Primary source metadata lists a date of 2026-05-05, which is temporally inconsistent with the established legal timeline. These sentencing details are based on reporting from The Record, pending formal confirmation from the DOJ.
Zolotarjovs was extradited to the United States in August 2024 following his arrest in Georgia. In July 2025, he pleaded guilty to money laundering and wire fraud. The recently announced sentence penalizes an affiliate who specialized not in network intrusion, but in converting victim fear into liquid capital.
The verdict underscores the reach of transnational justice in targeting the support personnel of Ransomware-as-a-Service (RaaS) groups. However, prosecutors cautioned that the organization—now operating under the Akira brand—remains active and ranks among the most significant threats of 2025.
Key Takeaways:
- Zolotarjovs received a 10% commission for negotiating with victims in English, using aggressive tactics to revive stalled talks.
- Federal prosecutors state the organization targeted over 53 companies, causing $56 million in losses while collecting approximately $3 million in payments.
- The criminal enterprise includes former Russian law enforcement officers and enjoyed benefits such as military service exemptions; the DOJ confirms it remains operational in 2025.
The Strategic Value of a Western-Educated Negotiator
Zolotarjovs was not the hacker breaching perimeters; he was the human interface of the extortion. According to federal prosecutors, his background made him a rare asset for a Russian criminal group. Having lived and studied in Western Europe, he possessed a mastery of the English language and Western negotiation dynamics that other group members lacked.
His role involved analyzing stolen data, identifying a victim’s pressure points, and leading negotiations to maximize the final payout. Prosecutors noted: “The defendant played a key role in the conspiracy. Having lived and attended school in Western Europe, he was an asset to the organization. His English skills and hardball tactics made him particularly effective in reviving negotiations.”
This blend of linguistic skill and psychological pressure allowed the group to restart failed negotiations and coerce victims into paying. For this expertise, he earned a 10% commission on collected ransoms—a percentage that reflects the strategic importance of the negotiation phase in the criminal lifecycle.
Inside the RaaS Machine
The organization Zolotarjovs supported is a textbook example of the compartmentalized Ransomware-as-a-Service model. The group is reportedly led by a former leader of the notorious Conti brand, operating out of a building in St. Petersburg, Russia.
Investigation details revealed a sophisticated structure that included former Russian law enforcement officers who enjoyed state-level perks, such as exemptions from military service. Roles were strictly defined: technical infrastructure managers, initial access brokers, malware developers, and negotiators like Zolotarjovs who managed victim contact.
The operation relied on double extortion: first encrypting systems, then threatening to publish sensitive stolen data. Between June 2021 and March 2023, the organization targeted over 53 companies. While prosecutors quantified total losses at roughly $56 million, they warned this figure likely underestimates the true impact.
Actual collected payments totaled approximately $3 million. This discrepancy suggests that many victims either refused to comply or successfully recovered from backups without paying the ransom.
Exploiting Healthcare Data: The Escalation of Threat Tactics
Zolotarjovs’ work extended beyond basic chat-based bargaining. He actively screened stolen materials to calibrate the intensity of the extortion, seeking information that could accelerate a victim's surrender.
In one documented case involving a pediatric healthcare provider, Zolotarjovs threatened the public release of sensitive clinical data. To prove the threat's validity, he sent samples of that data to hundreds of patients, shifting the attack from digital blackmail to a direct personal violation of privacy.
This was not indiscriminate data dumping, but a targeted strategy designed to exploit the sensitivity of medical records to increase the probability of payment.
A Persistent Threat in 2025
The federal judge’s 102-month sentence, while lower than the DOJ’s requested 126 months, remains severe. The gap suggests the court weighed Zolotarjovs’ role as a specialized affiliate rather than a high-level leader of the organization.
“His former ransomware associates have only grown more dangerous, becoming one of the most, if not the most, active ransomware groups today” - Federal Prosecutors, DOJ
This DOJ statement confirms that removing a single negotiator does not degrade the offensive capacity of a structured RaaS organization. The group has historically adapted, operating under various brands including Conti, Karakurt, TommyLeaks, SchoolBoys, and Akira, evolving its infrastructure to counter security measures and shifts in the initial access market.
While the sentencing serves as a deterrent to individual affiliates, it does not represent the dismantling of the broader threat.
Defense Strategies Against Professional Extortion
To counter a model that leverages sensitive data, native-level negotiators, and double extortion, defensive measures must be equally specialized.
Isolate and encrypt sensitive healthcare and pediatric data. In this case, the affiliate used clinical records to force payments by contacting patients directly. To neutralize this leverage, organizations should segment clinical archives, restrict access to authorized personnel only, and implement immediate alerts for anomalous access patterns.
Recognize the profile of the “Western” negotiator. Prosecutors noted that fluent English and aggressive tactics were used to “revive negotiations.” If an extortionist displays high cultural fluency and uses targeted psychological pressure, it is likely a specialized affiliate like Zolotarjovs. Ceasing communication and immediately involving the FBI/DOJ can disrupt this psychological pressure channel.
Immediate reporting of wallets and payment trails. The investigation showed Zolotarjovs received 10% of ransoms in cryptocurrency. Reporting wallet addresses and transactional details to federal authorities—rather than deleting evidence—enables blockchain tracking and hinders the group’s ability to launder proceeds.
Air-gapped backups and recovery testing to break the economic model. With $56 million in damage but only $3 million paid, the majority of victims resisted successfully. Resilience is achieved when backups are offline, verified, and capable of restoring operations within a predictable timeframe, rendering ransom payments unnecessary even in the face of leak threats.
The Zolotarjovs conviction proves that high-level affiliates, despite their specialization and cultural integration, are identifiable and prosecutable. However, the group’s continued activity emphasizes that the imprisonment of a single operator will not stop a criminal supply chain that functions like a corporate enterprise.
For defenders and law enforcement, the challenge remains disrupting the economic infrastructure and the initial access market, rather than just identifying the faces of the negotiation. As long as centralized hubs in St. Petersburg continue to coordinate former officials and Western-facing negotiators, ransomware will remain an industry rather than an isolated emergency.
Information verified against cited sources and updated at the time of publication.