Back to dashboard Read module

Quiz reading view

Quiz 1P — Ransomware Group Prosecutions: DOJ Disruption Operations

Use this quiz to check whether you can spot the controlling doctrine, procedural hinge, and practical move before treating Ransomware Group Prosecutions: DOJ Disruption Operations and Criminal Charges as learned.

Use this quiz to check whether you can spot the controlling doctrine, procedural hinge, and practical move before treating Ransomware Group Prosecutions: DOJ Disruption Operations and Criminal Charges as learned.

Type Quiz
Updated 2026-04-17
Reading time 7 min read
Questions 10

Check the reading before you move on.

01p-ransomware-prosecutions.md | Last updated: 2026-04-17

**DISCLAIMER:** Educational purposes only. Not legal advice.

Question 1

Yaroslav Vasinskyi was a REvil affiliate who deployed ransomware against Kaseya and approximately 2,500 other victims. He was arrested in Poland and extradited to the United States. What sentence did he receive in January 2024?

Question 2

No DarkSide operators have ever been convicted in U.S. courts following the Colonial Pipeline attack. Which of the following best explains why the absence of arrests does not mean the government did nothing?

Question 3

The Conti ransomware group's internal structure was exposed in February 2022 when approximately 60,000 internal chat messages and source code were leaked. What triggered the leak?

Question 4

Mikhail Matveev, also known as Wazawaka, was indicted in May 2023 for his role as an affiliate for Conti, LockBit, and Hive. The State Department offered $10 million for information leading to his arrest. What is his current status?

Question 5

Operation Cronos in February 2024 seized LockBit's infrastructure and unmasked its administrator as Dmitry Yuryevich Khoroshev. Which of the following was NOT part of the operation's publicly documented actions?

Question 6

ALPHV/BlackCat suffered an FBI disruption operation in December 2023. After the FBI seized its leak site and distributed decryption keys to approximately 500 victims, ALPHV demonstrated the ceiling of the disruption model by doing what?

Question 7

An incident response team learns their client was attacked by Evil Corp, which has been OFAC-sanctioned since December 2019. The client wants to pay the ransom immediately. Under OFAC's strict liability framework, which of the following is most accurate?

Question 8

Under the Ransomware-as-a-Service (RaaS) model, Alla Witte was a Trickbot/Conti malware developer who wrote code for the ransomware module but did not personally conduct attacks against victims. What was the legal outcome of her prosecution?

Question 9

A healthcare company receives a ransomware demand and, before paying, screens the attacker against the OFAC SDN list. The group is not listed. The company pays $22 million. Three months later, the group is added to the SDN list. Which of the following best describes the company's OFAC exposure at the time of payment?

Question 10

The DOJ's "disruption model" for ransomware treats indictment as a pressure tool rather than a conviction pipeline. Which of the following best describes what an indictment without an in-custody defendant practically accomplishes?