Polish police arrest 47-year-old Phobos ransomware suspect
Summary
Polish police arrested a man linked to the Phobos ransomware group, seizing devices with cybercrime evidence. He's charged with creating/sharing illicit software and faces up to 5 years.
Polish police arrest Phobos ransomware suspect
Polish police arrested a 47-year-old man in the Lesser Poland Voivodeship for his alleged involvement with the Phobos ransomware syndicate. Officers from the Central Office for Combating Cybercrime (CBZC) executed a search warrant at the suspect’s apartment and discovered evidence linking him to international cyberattacks.
Investigators seized several electronic devices that they claim contain specialized tools for breaching network security. The CBZC stated the man’s hardware held login credentials, passwords, credit card numbers, and server IP addresses used to facilitate ransomware deployments. This arrest is the latest development in a multi-year international effort to dismantle the Phobos infrastructure.
The suspect allegedly used encrypted messaging platforms to maintain contact with the core Phobos criminal group. Polish authorities have charged him with creating and sharing computer programs designed to obtain unauthorized access to information systems. If convicted, the man faces a maximum prison sentence of five years.
Evidence seized in apartment raid
The CBZC raid focused on gathering physical and digital evidence of the suspect’s role as an affiliate or facilitator for the ransomware group. During the search of the apartment, police recovered a variety of hardware and contraband. The inventory of seized items includes:
- One laptop used for managing remote server connections
- Four smartphones containing encrypted communication logs
- An assortment of payment cards linked to various accounts
- A small quantity of cannabis discovered during the search
Technical experts are currently analyzing the seized devices to extract more data. They believe the server IP addresses found on the hardware could identify ongoing or planned attacks against global targets. This data may also reveal how the suspect moved illicit funds generated from ransom payments.
The arrest follows a pattern of law enforcement targeting the support staff and affiliates of major ransomware-as-a-service (RaaS) operations. By removing local facilitators, authorities aim to disrupt the supply chain of stolen credentials that these groups rely on. The Polish suspect is currently being held as the investigation continues into his specific contributions to the Phobos network.
Operation Aether targets 8Base and Phobos
This arrest is a direct result of Operation Aether, a massive law enforcement campaign led by Europol. The operation specifically targets the 8Base ransomware group, which security researchers link directly to the Phobos ecosystem. 8Base emerged in 2022 and quickly became one of the most prolific ransomware threats in the world.
Law enforcement agencies believe 8Base and Phobos share significant portions of their underlying code and infrastructure. In 2023, Bavarian police successfully seized servers used to host the group’s data leak site. At the same time, authorities in Thailand arrested four individuals believed to be part of the same criminal network.
The collaboration between the CBZC and Europol highlights the increasing pressure on ransomware operators within the European Union. Operation Aether has focused on identifying the initial access brokers who sell the entry points into corporate networks. This Polish suspect is believed to have played a role in this part of the criminal pipeline.
Phobos victims and financial impact
Phobos has a long history of targeting organizations that cannot afford significant downtime. The group frequently attacks hospitals, schools, and non-profit organizations to pressure them into paying ransoms quickly. Since its inception, the group has recorded more than 1,000 victims across the globe.
The financial scale of the operation is substantial. Current law enforcement estimates provide a clear picture of the group's revenue model:
- Total estimated revenue: $16 million
- Average ransom payment: $54,000
- Primary attack vector: Remote Desktop Protocol (RDP) brute-forcing
- Common file extensions: .phobos, .eight, and .eking
Phobos typically gains entry by brute-forcing weak RDP credentials or purchasing them from third-party brokers. Once inside a network, the attackers move laterally to escalate privileges and exfiltrate sensitive data. They then deploy the ransomware to encrypt files, demanding payment in Bitcoin to restore access.
The group’s reliance on the RaaS model means that different affiliates can use the same malware for their own campaigns. This makes it harder for police to track the central leadership, as the attacks appear to come from many different sources. However, the $16 million in total earnings has left a financial trail that investigators are now following.
Extradition of Phobos administrator
The Polish arrest follows the significant capture of Evgenii Ptitsyn, the alleged administrator of the Phobos operation. Ptitsyn, a 42-year-old Russian national, was arrested in South Korea in 2024. His arrest was the result of a coordinated effort between the U.S. Department of Justice and South Korean authorities.
Following his arrest, Ptitsyn was extradited to the United States to face charges related to his leadership role in the ransomware syndicate. Prosecutors allege that he oversaw the development of the Phobos malware and managed the affiliate program. His capture provided law enforcement with a wealth of intelligence regarding the group’s internal structure.
The information gathered from Ptitsyn’s devices has likely contributed to subsequent arrests like the one in Poland. By targeting both the high-level administrators and the low-level affiliates, law enforcement is attempting to collapse the entire Phobos brand. This strategy forces cybercriminals to abandon their established brands and start over with new infrastructure.
The link between Phobos and 8Base
Security researchers have long suspected that 8Base is either a rebrand of Phobos or a very large affiliate group. The two groups use nearly identical ransom notes and communication styles. The technical specifications of their encryption methods also show significant overlap, suggesting they use the same core software builders.
The CBZC’s involvement in Operation Aether confirms that law enforcement views these groups as part of the same threat landscape. While Phobos has been active for years, 8Base represents a more modern, aggressive version of the same tactics. Both groups utilize double extortion, where they threaten to leak stolen data if the ransom is not paid.
The Polish suspect’s devices contained data that could link these two groups even more closely. By analyzing the encrypted messaging logs found on the seized smartphones, investigators hope to map out the hierarchy between Phobos administrators and 8Base operators. This could lead to further raids across Europe and Asia.
The CBZC continues to work with the FBI and Europol to process the data recovered from the Lesser Poland raid. They are currently notifying potential victims whose credentials were found on the suspect's laptop. This proactive approach aims to prevent future ransomware deployments before the encryption process begins.
Related Articles

FBI Recovers Nancy Guthrie's Nest Footage Without Subscription
The FBI recovered video from a Google Nest camera without a subscription, likely from residual cloud data or device fragments, raising privacy concerns about smart doorbells.

Ring cancels Flock Safety partnership over integration delays
Ring canceled its Flock Safety partnership after privacy backlash over a Super Bowl ad for its "Search Party" feature. The deal would have streamlined police requests for user footage. The feature itself remains active.
Stay in the loop
Get the best AI-curated news delivered to your inbox. No spam, unsubscribe anytime.
