A Latvian national affiliated with the prolific ransomware operations known as Conti and Akira has been sentenced to eight and a half years of imprisonment in the United States. According to the prosecution, Deniss Zolotarjovs did not merely facilitate negotiations with victims; rather, he exerted psychological leverage on targeted corporations by weaponizing exfiltrated data, which included the sensitive medical records of children.
Zolotarjovs entered a guilty plea in July 2025 to charges of money laundering and wire fraud. Prior to his extradition to the United States in August 2024, he was apprehended in Georgia. Investigators characterized the 35-year-old Latvian citizen as a pivotal operative within the extortion network.
His function primarily involved the forensic analysis of purloined files, gathering intelligence on victimized entities, and escalating pressure during the negotiation phase. He was typically deployed during the final stages of an incursion, tasked with compelling victims to capitulate to ransom demands. For each successfully coerced payment, Zolotarjovs received a 10% commission.
In one particularly egregious instance cited by prosecutors, following a pediatric medical firm’s refusal to pay, he proposed the sale or public leak of children’s data. He subsequently orchestrated the transmission of stolen data samples to hundreds of patients as a menacing display of intent.
U.S. authorities linked Zolotarjovs to the Karakurt group, which investigators allege was directed by a former leader of the now-defunct Conti syndicate. The organization operated under various monikers—including Conti, Karakurt, Royal, TommyLeaks, SchoolBoys, and Akira—to conduct its extortion campaigns. The FBI successfully gained access to a dedicated chat server where members coordinated incursions, deliberated on extortion tactics, and allocated illicit proceeds.
Between June 2021 and March 2023, the syndicate exfiltrated data from and extorted more than fifty-three organizations. The damages attributed specifically to Zolotarjovs’ role were estimated at $56 million, encompassing nearly $3 million in paid ransoms; however, prosecutors contend that these figures significantly understate the actual impact.
While the prosecution sought a term of ten and a half years, the court ultimately imposed a sentence of eight and a half years. The U.S. Department of Justice stated that this conviction deprives the extortion network of a sophisticated negotiator. Nevertheless, the agency cautioned that his associates remain operational, with Akira emerging in 2025 as one of the most frequently encountered ransomware threats, according to analysis by Google specialists.