Good afternoon. Today’s announcement of the arrest of Yaroslav Vasinskyi in Poland, and the charges against and seizure from Yevgeniy Polyanin, shows what’s possible when federal and international law enforcement work together with private sector companies.
It also demonstrates our resolve in pursuing criminal enterprises that use ransomware to threaten our critical infrastructure, our public health and safety, and our economic vitality.
As the Attorney General noted, this ransomware strain has wreaked havoc across the globe, extorting vast sums and inflicting significant damage with attacks on, to name just a few: JBS foods, local governments in Texas, hospitals, schools, 911 call centers, and of course, Kaseya.
When Kaseya realized some of their customers’ networks were infected with ransomware, they immediately took action.
They worked to make sure both their own customers—managed service providers [MSPs]—and those MSPs’ customers downstream quickly disabled Kaseya’s software on their systems
They also engaged with us early. The FBI coordinated with a host of key partners—including CISA and foreign law enforcement and intelligence services—so Kaseya could benefit from all of our expertise and reach as it worked to put out the fire.
Kaseya’s swift response allowed the FBI and our partners to quickly figure out which of its customers were hit and for us to quickly share with Kaseya and its customers information about what the adversaries were doing, what to look for, and how the companies could best address the danger.
Here, we were able to obtain a usable decryption key that allowed us to generate a capability to unlock Kaseya customers’ data.
We immediately strategized with our interagency partners and reached a carefully considered decision about how to help the most companies possible, both by providing the key, and by maximizing our government’s impact on our adversaries, who continued to mount new attacks.
Ultimately, we were able both to unlock encrypted data and to take bad actors out of operation, including by hitting Sodinokibi more broadly, seizing cryptocurrency, and, as you just heard, late last week our partner Romanian authorities also arrested two other individuals suspected of cyberattacks using Sodinokibi/REvil ransomware.
As the attorney general and deputy attorney general mentioned, the steps we’ve announced today are yet another example highlighting why the public needs breach reporting legislation that provides the FBI real-time access to information about ransomware attacks and other criminal breaches.
When the FBI is engaged early, we can provide victims more and better support. We get them the intelligence and technical information they need faster. And we can quickly work back from that intrusion to follow and seize the criminals’ money before it can jump through wallet after wallet and exchange after exchange, identify other victims about to be hit or in the early stages of further attacks, and make connections between what the reporting victim sees and intelligence we gather from around the world, arming both the private sector and our government partners with insights they can act on.
We’ve deployed technically trained agents, computer scientists, intelligence analysts, and others in every one of our 56 field offices across the country so we can warn businesses big and small, wherever they may be, quickly and with the information they need to defend their networks.
Over the past few years, ransomware schemes have repeatedly crippled hospital systems, targeted the energy sector, threatened emergency services, and cost or endangered thousands of jobs at businesses of every kind and size.
Most of the time, the actors themselves are trying to hide abroad, but as we’ve shown time and again, we’ll still pursue them, disrupt them, and hold them accountable. The long arm of the law reaches a lot farther than they think.
And we’ve got ways of disrupting those sheltering in places like Russia—as Polyanin discovered when he woke up and found $6.1 million he’d extorted from his victims missing.
Good partners of ours, like the Treasury and State departments, are also adept at turning the results of our investigations into action and pressure abroad.
I want to thank Kaseya and other private sector partners for their invaluable help in this case—and for the way they’ve joined our response to the ransomware threat.
I also want to thank our own Dallas and Jackson field offices for leading the investigation.
And I’m grateful to all our federal partners, and our many foreign partners, especially Poland, Romania, Ukraine, France, and Germany.
The cyber threat is daunting—but when we combine the right people, the right tools, and the right authorities, our adversaries are no match for what we can accomplish together.
Thank you. And now I’ll turn the podium over to the Deputy Secretary of the Treasury Wally Adeyemo.