logo
Cops in Germany Claim They've ID'd the Mysterious Trickbot Ransomware Kingpin

Cops in Germany Claim They've ID'd the Mysterious Trickbot Ransomware Kingpin

WIREDa day ago

Matt Burgess Lily Hay Newman May 30, 2025 9:22 AM The elusive boss of the Trickbot and Conti cybercriminal groups has been known only as 'Stern.' Now, German law enforcement has published his alleged identity—and it's a familiar face. Photograph:For years, members of the Russian cybercrime cartel Trickbot unleashed a relentless hacking spree on the world. The group attacked thousands of victims, including businesses, schools, and hospitals. 'Fuck clinics in the usa this week,' one member wrote in internal Trickbot messages in 2020 about a list of 428 hospitals to target. Orchestrated by an enigmatic leader using the online moniker 'Stern,' the group of around 100 cybercriminals stole hundreds of millions of dollars over the course of roughly six years.
Despite a wave of law enforcement disruptions and a damaging leak of more than 60,000 internal chat messages from Trickbot and the closely associated counterpart group Conti, the identity of Stern has remained a mystery. Last week, though, Germany's federal police agency, the Bundeskriminalamt or BKA, and local prosecutors alleged that Stern's real-world name is Vi­ta­ly Ni­ko­lae­vich Kovalev, a 36-year-old, 5'11' Russian man who cops believe is in his home country and thus shielded from potential extradition.
A recently issued Interpol red notice says that Kovalev is wanted by Germany for allegedly being the 'ringleader' of a 'criminal organisation.'
'Stern's naming is a significant event that bridges gaps in our understanding of Trickbot—one of the most notorious transnational cybercriminal groups to ever exist,' says Alexander Leslie, a threat intelligence analyst at the security firm Recorded Future. 'As Trickbot's 'big boss' and one of the most noteworthy figures in the Russian cybercriminal underground, Stern remained an elusive character, and his real name was taboo for years.'
Stern has notably seemed to be absent from multiple rounds of Western sanctions and indictments in recent years calling out alleged Trickbot and Conti members. Leslie and other researchers have long speculated to WIRED that global law enforcement may have strategically withheld Stern's alleged identity as part of ongoing investigations. Kovalev is suspected of being the 'founder' of Trickbot and allegedly used the Stern moniker, the BKA said in an online announcement.
'It has long been assumed, based on numerous indications, that 'stern' is in fact 'Kovalev',' a BKA spokesperson says in written responses to questions from WIRED. They add that, 'The investigating authorities involved in Operation Endgame were only able to identify the actor stern as 'Kovalev' during their investigation this year,' referring to a multi-year international effort to identify and disrupt cybercriminal infrastructure, known as Operation Endgame.
The BKA spokesperson also notes in written statements to WIRED that information obtained through a 2023 investigation into the Qakbot malware as well as analysis of the leaked Trickbot and Conti chats from 2022 were 'helpful' in making the attribution. They added, too, that the 'assessment is also shared by international partners.'
The German announcement is the first time that officials from any government have publicly alleged an identity for a suspect behind the Stern moniker. As part of Operation Endgame, BKA's Stern attribution inherently comes in the context of a multinational law enforcement collaboration. But unlike in other Trickbot and Conti-related attributions, other countries have not publicly concurred with BKA's Stern identification thus far. Europol, the US Department of Justice, the US Treasury, and the UK's Foreign, Commonwealth & Development Office did not immediately respond to WIRED's requests for comment.
Several cybersecurity researchers who have tracked Trickbot extensively tell WIRED they were unaware of the announcement. An anonymous account on the social media platform X recently claimed that Kovalev used the Stern handle and published alleged details about him. WIRED messaged multiple accounts that supposedly belong to Kovalev, according to the X account and a database of hacked and leaked records compiled by District 4 Labs but received no response.
Meanwhile, Kovalev's name and face may already be surprisingly familiar to those who have been following recent Trickbot revelations. This is because Kovalev was jointly sanctioned by the United States and United Kingdom in early 2023 for his alleged involvement as a senior member in Trickbot. He was also charged in the US at the time with hacking linked to bank fraud allegedly committed in 2010. The US added him to its most wanted list. In all of this activity, though, the US and UK linked Kovalev to the online handles 'ben' and 'Bentley.' The 2023 sanctions did not mention a connection to the Stern handle. And, in fact, Kovalev's 2023 indictment was mainly noteworthy because his use of 'Bentley' as a handle was determined to be 'historic' and distinct from that of another key Trickbot member who also went by 'Bentley.'
The Trickbot ransomware group first emerged around 2016, after its members moved from the Dyre malware that was disrupted by Russian authorities. Over the course of its lifespan, the Trickbot group—which used its namesake malware, alongside other ransomware variants such as Ryuk, IcedID, and Diavol—increasingly overlapped in operations and personnel with the Conti gang. In early 2022, Conti published a statement backing Russia's full-scale invasion of Ukraine, and a cybersecurity researcher who had infiltrated the groups leaked more than 60,000 messages from Trickbot and Conti members, revealing a huge trove of information about their day-to-day operations and structure.
Stern acted like a 'CEO' of the Trickbot and Conti groups and ran them like a legitimate company, leaked chat messages analyzed by WIRED and security researchers show.
'Trickbot set the mold for the modern 'as-a-service' cybercriminal business model that was adopted by countless groups that followed,' Recorded Future's Leslie says. 'While there were certainly organized groups that preceded Trickbot, Stern oversaw a period of Russian cybercrime that was characterized by a high level of professionalization. This trend continues today, is reproduced worldwide, and is visible in most active groups on the dark web.'
Stern's eminence within Russian cybercrime has been widely documented. The cryptocurrency tracing firm Chainalysis does not publicly name cybercriminal actors and declined to comment on BKA's identification, but the company emphasized that the Stern persona alone is one of the all-time most profitable ransomware actors it tracks.
'The investigation revealed that stern generated significant revenues from illegal activities, in particular in connection with ransomware,' the BKA spokesperson tells WIRED.
Stern 'surrounds himself with very technical people, many of which he claims to have sometimes decades of experience, and he's willing to delegate substantial tasks to these experienced people whom he trusts,' says Keith Jarvis, a senior security researcher at cybersecurity firm Sophos' Counter Threat Unit. 'I think he's always probably lived in that organizational role.'
Increasing evidence in recent years has indicated that Stern has at least some loose connections to Russia's intelligence apparatus, including its main security agency, the Federal Security Service (FSB). The Stern handle mentioned setting up an office for 'government topics' in July 2020, while researchers have seen other members of the Trickbot group say that Stern is likely the 'the link between us and the ranks/head of department type at FSB.'
Stern's consistent presence was a significant contributor to Trickbot and Conti's effectiveness—as was the entity's ability to maintain strong operational security and remain hidden.
As Sophos' Jarvis put it, 'I have no thoughts on the attribution as I've never heard a compelling story about Stern's identity from anyone prior to this announcement.'

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Haribo recalls candy after cannabis found in gummies, family gets sick
Haribo recalls candy after cannabis found in gummies, family gets sick

Yahoo

time12 minutes ago

  • Yahoo

Haribo recalls candy after cannabis found in gummies, family gets sick

The Brief A family in the Netherlands became unwell after eating a popular Haribo candy. Food safety investigators found some bags were tainted with cannabis. They're still trying to figure out how the cannabis got into the candy. Haribo has recalled bags of candy in the Netherlands after a family reported getting sick and sampling found cannabis in the gummies. What we know The Netherlands Food and Consumer Product Safety Authority told the Netherlands outlet Hart van Nederland that several members of a family felt unwell after eating Haribo Happy Cola F!ZZ gummies. A sampling of the candy revealed cannabis in three bags, leading Haribo to recall the candy. The recall includes 1kg packs of Haribo Happy Cola F!ZZ with a best-before date of January 2026. The recall only impacts the Netherlands. No products in the U.S. are affected. RELATED: Ice cream recall issued due to potential plastic contamination What we don't know It's still unclear how the cannabis got into the candy, or how many people reported feeling unwell. It's also not clear whether the bags were actually made by Haribo, or if they were fake. RELATED: Heavy cannabis use linked to impaired working memory, new study finds What they're saying A spokesperson for Germany-based Haribo told BBC the company is working with police to "establish the facts around the contamination." The Netherlands food safety agency warned that eating the recalled candy "can lead to health complaints, such as dizziness." "Do not eat the sweets," the agency said. The Source This report includes information from BBC and the Netherlands news outlet Hart van Nederland.

PSG fans display banner calling for end to 'genocide' in Gaza during Champions League final
PSG fans display banner calling for end to 'genocide' in Gaza during Champions League final

Associated Press

time24 minutes ago

  • Associated Press

PSG fans display banner calling for end to 'genocide' in Gaza during Champions League final

MUNICH (AP) — Paris Saint-Germain supporters displayed a banner saying 'Stop (the) genocide in Gaza' during the Champions League final on Saturday. They raised it shortly after Achraf Hakimi gave their team a 1-0 lead against his former side Inter Milan in the 12th minute. Désiré Doué scored PSG's second after the banner was raised. PSG fans are known for their stance against the war in Gaza. They previously displayed a giant banner saying 'Free Palestine' in November during the Champions League match against Atlético Madrid. Israel's nearly three-month blockade on Gaza has pushed the population of over two million to the brink of famine. It has allowed some aid to enter in recent days, but aid organizations say far from enough is getting in. The U.N. World Food Program said the fear of starvation in Gaza is high. The war began when Hamas attacked Israel on Oct. 7, 2023, killing around 1,200 people, most of them civilians, and taking 250 hostages. Israeli strikes have killed more than 54,000 Gaza residents, mostly women and children, according to Gaza's Health Ministry, which does not distinguish between civilians and combatants in its tally. ___ AP soccer:

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store