DoppelPaymer ransomware suspects cuffed, alleged ringleaders escape

German and Ukrainian cops have arrested suspected members of the DoppelPaymer ransomware crew and issued warrants for three other “Masterminds” behind the global operation that extorted tens of millions of dollars and may have led to the death of a hospital patient.

In simultaneous actions on February 28, German police arrested a local suspect the cops say “Played a major role” in the ransomware gang and seized equipment from the suspect’s home.

The cops issued arrest warrants for three “Suspected masterminds” behind the Russian-connected ransomware gang.

DoppelPaymer has been around since 2019, when criminals first started using the ransomware to attack critical infrastructure, health-care facilities, school districts and governments.

It’s based on BitPaymer ransomware and is part of the Dridex malware family, but with some interesting adaptations.

According to Europol, DoppelPaymer ransomware used a unique evasion tool to shut down security-related processes of the attacked systems, and these attacks also relied on the prolific Emotet botnet.

Share this article on social media:

Subscribe to Our Newsletter!
Stay on top of cybersecurity risks, evolving threats and industry news.
This field is for validation purposes and should be left unchanged.

The Latest Cybersecurity News

From major cyberattacks, newly discovered critical vulnerabilities to recommended best practices, read it here first:

Tell us About your Needs
Get an Answer the Same Business Day

Got an urgent request? Call us at 1-877-805-7475 or Book a meeting.

What happens next:

A Vumetric expert will contact you to learn more about your cybersecurity needs and goals.

The project's scope will be defined (Target environment, deadlines, requirements, etc.)

A detailed quote including all-inclusive pricing and statement of work is sent to you.

This field is for validation purposes and should be left unchanged.


Everything You Need to Know

Gain confidence in your future cybersecurity assessments by learning to effectively plan, scope and execute projects.


Enter your Email Address

This field is for validation purposes and should be left unchanged.

* No free email provider (e.g:,, etc.)

This site is registered on as a development site. Switch to a production site key to remove this banner.