TRJ CYBERSECURITY INTEL REPORT
CATEGORY: Botnet Malware Operations / International Indictments
FEATURES: Malware creation, ransomware distribution, botnet-as-a-service, U.S. indictment, civil forfeiture of crypto assets
DELIVERY METHOD: Qakbot malware, spam campaigns, phishing payloads, credential theft
THREAT ACTOR: Rustam Gallyamov (aka “Botmaster of Qakbot”), alleged Russian cybercrime leader and broker for multiple ransomware syndicates
“You don’t need to launch ransomware to profit — you just need to rent the front door to someone who will.”
The U.S. Department of Justice has unsealed formal charges against Rustam Gallyamov, a 48-year-old Russian national and the alleged mastermind behind Qakbot — one of the most damaging and long-running malware infrastructures in the history of cybercrime.
According to the newly released indictment, Gallyamov created Qakbot in 2008, and operated it as a botnet-as-a-service platform for over 15 years. His codebase became a Swiss army knife for cybercriminal syndicates, enabling ransomware payload delivery, credential theft, banking fraud, and persistent remote access on over 700,000 machines globally.
Qakbot: The Malware That Fueled a Ransomware Empire
Qakbot wasn’t just another malware. It was the starting pistol for dozens of ransomware operations — a loader that provided stable access into enterprise networks before secondary payloads were unleashed. The DOJ confirmed that Qakbot was used in campaigns tied to:
- Conti
- REvil
- Black Basta
- DoppelPaymer
- MegaCortex
- ProLock
Each of these gangs used Qakbot as a foothold — leveraging its infection chain to deliver encryption payloads, extort businesses, and leak sensitive data. In exchange, Gallyamov was paid a cut of the ransom proceeds, turning his creation into a rentable gateway for chaos.
Victims included:
- A Los Angeles dental clinic
- A Nebraska tech firm
- A Wisconsin manufacturer
- A Canadian real estate company
- Multiple unlisted energy, education, and healthcare systems
Operation Duck Hunt: The Takedown That Broke the Botnet
In August 2023, the U.S. DOJ, in coordination with agencies in France, Germany, the U.K., Romania, the Netherlands, and Latvia, executed Operation Duck Hunt — a multi-national digital strike that:
- Seized Qakbot command and control servers
- Deleted the malware from infected endpoints remotely
- Dismantled the infrastructure used to distribute and control the botnet
- Captured evidence logs, crypto wallets, and access keys for future prosecution
This operation was hailed as a landmark offensive — one of the few times law enforcement not only took down a malware network, but scrubbed it from user devices in real time.
The Evolution: Spam Bombing After the Fall
After the fall of Qakbot’s infrastructure, Gallyamov’s group pivoted, launching “spam bomb” phishing attacks designed to overwhelm inboxes and trick employees into clicking malicious links or granting elevated access. This tactic mimicked the early days of malware distribution — but at scale, automated, and paired with deceptive login portals to harvest Microsoft 365 credentials.
These attacks showed that even after losing his flagship tool, Gallyamov’s network remained operational, nimble, and dangerous — leveraging human error in place of brute-force code.
$24 Million Seized — And A Global Warning Issued
Alongside the indictment, the Justice Department also filed a civil forfeiture complaint to seize over $24 million in cryptocurrency and digital assets linked to Gallyamov’s operation.
This represents only a fraction of Qakbot’s estimated economic impact — but it sends a clear message: building malware is now as prosecutable as deploying it.
“You don’t need to be the one pressing the encryption button to be held accountable. If you make the weapon, lease the access, or profit from the infrastructure — you’re part of the crime,” said a DOJ official involved in the case.
The indictment was led by the FBI’s Los Angeles Cyber Division, with assistance from German BKA, the Dutch National Police, and French cybercrime units.
TRJ CONCLUSION
The arrest and indictment of Rustam Gallyamov marks a turning point in how cybercrime infrastructure is policed.
For over a decade, Qakbot was treated as a shadow — a persistent, modular, evolving threat used by gangs around the world. But now, the DOJ has pierced that shadow — identifying not just its users, but its maker.
This is cybercrime accountability at the source.
The implications are profound:
- Malware developers are now international targets, even if they never deploy the code themselves.
- Leasing access to criminals is no longer “safe distance” behavior — it’s collusion.
- Infrastructure-level indictments signal a new era where tools are as criminal as actions.
Qakbot was never just malware — it was a black-market operating system, rented out to gangs for profit. And now? Its architect faces global justice.
TRJ // Threat Continuity Forecast
- Expect splinter groups to re-emerge using Qakbot forks by Q3 2025
- RaaS platforms will likely shift to more decentralized loader protocols
- “Spam Bombing” as a post-takedown tactic will increase against midsize businesses
- Civil forfeiture will become a regular part of cybercrime strategy
- High-value malware creators are now priority targets for U.S. extraterritorial prosecution
🔥 NOW AVAILABLE! 🔥
📖 INK & FIRE: BOOK 1 📖
A bold and unapologetic collection of poetry that ignites the soul. Ink & Fire dives deep into raw emotions, truth, and the human experience—unfiltered and untamed.
🔥 Kindle Edition 👉 https://a.co/d/9EoGKzh
🔥 Paperback 👉 https://a.co/d/9EoGKzh
🔥 Hardcover Edition 👉 https://a.co/d/0ITmDIB
Get your copy today and experience poetry like never before. #InkAndFire #PoetryUnleashed #FuelTheFire
🚨 NOW AVAILABLE! 🚨
📖 THE INEVITABLE: THE DAWN OF A NEW ERA 📖
A powerful, eye-opening read that challenges the status quo and explores the future unfolding before us. Dive into a journey of truth, change, and the forces shaping our world.
🔥 Kindle Edition 👉 https://a.co/d/0FzX6MH
🔥 Paperback 👉 https://a.co/d/2IsxLof
🔥 Hardcover Edition 👉 https://a.co/d/bz01raP
Get your copy today and be part of the new era. #TheInevitable #TruthUnveiled #NewEra
🚀 NOW AVAILABLE! 🚀
📖 THE FORGOTTEN OUTPOST 📖
The Cold War Moon Base They Swore Never Existed
What if the moon landing was just the cover story?
Dive into the boldest investigation The Realist Juggernaut has ever published—featuring declassified files, ghost missions, whistleblower testimony, and black-budget secrets buried in lunar dust.
🔥 Kindle Edition 👉 https://a.co/d/2Mu03Iu
🛸 Paperback Coming Soon
Discover the base they never wanted you to find. TheForgottenOutpost #RealistJuggernaut #MoonBaseTruth #ColdWarSecrets #Declassified
Support truth, health, and preparedness by shopping the Alex Jones Store through our link. Every purchase helps sustain independent voices and earns us a 10% share to fuel our mission. Shop now and make a difference!
https://thealexjonesstore.com?sca_ref=7730615.EU54Mw6oyLATer7a

