U.S. Sanctions Garantex and Grinex for Facilitating Ransomware Transactions
Summary
Hide â˛
Show âŧ
The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) has renewed sanctions against Garantex and imposed new sanctions on its successor, Grinex, for facilitating over $100 million in ransomware-linked illicit crypto transactions since 2019. The sanctions also target three executives of Garantex and six associated companies in Russia and the Kyrgyz Republic. The Treasury noted that Garantex has been involved in processing transactions for multiple ransomware variants, including Conti, Black Basta, LockBit, NetWalker, Phoenix Cryptolocker, and Ryuk. Grinex, which is believed to be a rebranding of Garantex, has facilitated billions of dollars in cryptocurrency transactions since its inception in December 2024. The sanctions aim to disrupt the financial operations of these entities and prevent them from continuing to support cybercrime and sanctions evasion.
Timeline
-
15.08.2025 14:27 đ° 1 articles
U.S. Renews Sanctions Against Garantex and Imposes New Sanctions on Grinex
The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) renewed sanctions against Garantex and imposed new sanctions on Grinex for facilitating over $100 million in ransomware-linked illicit crypto transactions since 2019. The sanctions also target three executives of Garantex and six associated companies in Russia and the Kyrgyz Republic. The Treasury noted that Garantex has been involved in processing transactions for multiple ransomware variants, including Conti, Black Basta, LockBit, NetWalker, Phoenix Cryptolocker, and Ryuk. Grinex, which is believed to be a rebranding of Garantex, has facilitated billions of dollars in cryptocurrency transactions since its inception in December 2024. The sanctions aim to disrupt the financial operations of these entities and prevent them from continuing to support cybercrime and sanctions evasion.
Show sources
- U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions â thehackernews.com â 15.08.2025 14:27
Information Snippets
-
Garantex and Grinex have processed over $100 million in transactions linked to illicit activities since 2019.
First reported: 15.08.2025 14:27đ° 1 source, 1 articleShow sources
- U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions â thehackernews.com â 15.08.2025 14:27
-
Garantex was first sanctioned in April 2022 for facilitating transactions from darknet markets and illicit actors.
First reported: 15.08.2025 14:27đ° 1 source, 1 articleShow sources
- U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions â thehackernews.com â 15.08.2025 14:27
-
Garantex's website was seized in March 2025, and its co-founder, Aleksej Besciokov, was arrested in India.
First reported: 15.08.2025 14:27đ° 1 source, 1 articleShow sources
- U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions â thehackernews.com â 15.08.2025 14:27
-
Garantex has been linked to multiple ransomware variants, including Conti, Black Basta, LockBit, NetWalker, Phoenix Cryptolocker, and Ryuk.
First reported: 15.08.2025 14:27đ° 1 source, 1 articleShow sources
- U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions â thehackernews.com â 15.08.2025 14:27
-
Garantex moved its infrastructure and customer deposits to Grinex shortly after the March 2025 law enforcement actions.
First reported: 15.08.2025 14:27đ° 1 source, 1 articleShow sources
- U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions â thehackernews.com â 15.08.2025 14:27
-
Grinex has facilitated the transfer of billions of dollars in cryptocurrency transactions since its inception in December 2024.
First reported: 15.08.2025 14:27đ° 1 source, 1 articleShow sources
- U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions â thehackernews.com â 15.08.2025 14:27
-
The A7A5 token, issued by Old Vector, has been used to transfer no less than $1 billion per day, with an aggregate value of $41.2 billion.
First reported: 15.08.2025 14:27đ° 1 source, 1 articleShow sources
- U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions â thehackernews.com â 15.08.2025 14:27
-
Ekaterina Zhdanova, a prolific money launderer, exchanged over $2 million in Bitcoin for Tether (USDT) via Garantex.
First reported: 15.08.2025 14:27đ° 1 source, 1 articleShow sources
- U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions â thehackernews.com â 15.08.2025 14:27
-
The U.S. Department of State has announced rewards for information leading to the arrest of key leaders of Garantex.
First reported: 15.08.2025 14:27đ° 1 source, 1 articleShow sources
- U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions â thehackernews.com â 15.08.2025 14:27
-
The U.S. Department of Justice (DoJ) unsealed six warrants authorizing the seizure of over $2.8 million in cryptocurrency, $70,000 in cash, and a luxury vehicle linked to ransomware activity.
First reported: 15.08.2025 14:27đ° 1 source, 1 articleShow sources
- U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions â thehackernews.com â 15.08.2025 14:27
-
More than $300 million in cryptocurrency assets linked to cybercrime and fraud schemes have been frozen.
First reported: 15.08.2025 14:27đ° 1 source, 1 articleShow sources
- U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions â thehackernews.com â 15.08.2025 14:27
Similar Happenings
U.S. sanctions Southeast Asian cyber scam operations targeting Americans
The U.S. Department of the Treasury has sanctioned multiple cyber scam operations in Southeast Asia, primarily in Burma and Cambodia, which collectively stole over $10 billion from Americans in 2024. These operations use forced labor, human trafficking, and violence, operating as modern slavery farms. The scams involve romance baiting and fake cryptocurrency investments. The financial damage increased by 66% compared to 2023. The sanctions target 19 entities and individuals, including those linked to the Karen National Army (KNA) in Burma and various organized crime networks in Cambodia. The sanctions block these entities from the U.S. financial system and limit their access to international financial services. The cybercriminal syndicates in Southeast Asia are estimated to net nearly $40 billion annually in illicit profits. In May, OFAC targeted Funnull Technology Inc. and its administrator Liu Lizhi for their part in romance scams that caused more than $200 million in losses. In July, Cambodian law enforcement raided several cyber-scam centers, arresting more than 1,000 people, the majority of whom were foreign nationals. The UNODC reported that the cybercriminal operations in the region netted $40 billion in 2024, a significant fraction of the GDPs of many nations in the region. Interpol reported arrests of more than 1,200 cyber- and financial criminals in Africa, many of whom were foreign nationals from Southeast Asia conducting similar operations.
North Korean actors exploit fake employee identities to infiltrate companies
North Korean state-sponsored hackers have infiltrated companies by using fake or stolen identities to secure IT jobs. These actors have stolen virtual currency and funneled money to North Korea's weapons program. The practice has grown with the rise of remote work and AI, posing significant security risks to organizations. The Justice Department has disrupted several laptop farms enabling these activities, but the threat persists. The U.S. Treasury has imposed sanctions on individuals and entities involved in the scheme, highlighting the use of AI to create convincing professional backgrounds and technical portfolios. Organizations are advised to enhance supervision, access governance, and use AI tools to detect and mitigate these insider threats. Japan, South Korea, and the United States are cooperating to combat North Korean IT worker fraud schemes. The joint forum held on Aug. 26 in Tokyo aimed to improve collaboration among the three countries. The scheme involves thousands of operatives and facilitators with distinct roles, including setting up laptop farms, contacting recruiters, and processing stolen information. The North Korean remote-worker scheme has collected more than $88 million over six years. The number of North Korean operatives infiltrating companies by posing as remote IT workers has increased by 220% year-over-year. North Korean operatives have used AI-generated profiles, deepfakes, and real-time AI manipulation to pass interviews and vetting protocols. American accomplices have operated laptop farms to provide North Korean operatives with physical US setups, company-issued machines, and domestic addresses and identities. The threat of hiring fraud is escalating quickly, with over 320 cases of North Korean operatives infiltrating companies reported in August 2025.