• Cyber Syrup
  • Posts
  • Iranian National Pleads Guilty in Robbinhood Ransomware Scheme

Iranian National Pleads Guilty in Robbinhood Ransomware Scheme

An Iranian national has pleaded guilty in a U.S. federal court for his role in a years-long ransomware and extortion campaign involving the Robbinhood ransomware strain

In partnership with

CYBER SYRUP
Delivering the sweetest insights on cybersecurity.

Automate Prospecting Local Businesses With Our AI BDR

Struggling to identify local prospects? Our AI BDR Ava taps into a database of 200M+ local Google businesses and does fully autonomous outreach—so you can focus on closing deals, not chasing leads.

Ava operates within the Artisan platform, which consolidates every tool you need for outbound:

  • 300M+ High-Quality B2B Prospects

  • Automated Lead Enrichment With 10+ Data Sources Included

  • Full Email Deliverability Management

  • Personalization Waterfall using LinkedIn, Twitter, Web Scraping & More

Iranian National Pleads Guilty in Robbinhood Ransomware Scheme

An Iranian national has pleaded guilty in a U.S. federal court for his role in a years-long ransomware and extortion campaign involving the Robbinhood ransomware strain. The campaign targeted U.S. cities and organizations, leading to widespread disruption of public services and millions of dollars in losses.

The defendant, Sina Gholinejad (also known as Sina Ghaaf), age 37, was arrested in North Carolina in January 2025. He pleaded guilty to one count of computer fraud and abuse and one count of conspiracy to commit wire fraud. He faces up to 30 years in prison, with sentencing scheduled for August 2025.

The Scope of the Attack

According to the U.S. Department of Justice (DoJ), Gholinejad and his co-conspirators orchestrated a series of cyber intrusions across multiple U.S. organizations between January 2019 and March 2024. These intrusions included:

  • Unauthorized access to victim networks

  • Deployment of Robbinhood ransomware

  • Theft of sensitive data

  • Demands for Bitcoin ransom payments

Notable Victims

Two high-profile victims illustrate the impact of the operation:

  • City of Greenville, North Carolina

  • City of Baltimore, Maryland

The Baltimore attack alone resulted in over $19 million in damages. It disrupted key public services, including:

  • Online payments for property taxes and water bills

  • Parking citation processing

  • Other essential government functions

These services were down for months, causing not only financial loss but also public frustration and reduced civic operations.

Attack Methodology

Gholinejad’s group used a variety of advanced cybercrime tactics:

1. Initial Access and Persistence

The attackers gained initial access to systems through vulnerability exploitation or phishing, then maintained long-term unauthorized access.

2. Data Exfiltration

Before launching ransomware, data was exfiltrated and transferred to virtual private servers (VPS) under their control, increasing leverage in ransom negotiations.

3. BYOVD Exploitation

The attackers used a technique called Bring Your Own Vulnerable Driver (BYOVD). In particular, they deployed the Gigabyte gdrv.sys driver, which is known to have security flaws. This allowed them to:

  • Escalate privileges

  • Disable antivirus and endpoint protection systems

4. Ransomware Deployment

After disabling security controls, they launched Robbinhood ransomware, encrypting critical files and demanding cryptocurrency payments for decryption keys.

5. Anonymity and Evasion

To obscure their identities, the attackers relied on:

  • Virtual Private Networks (VPNs)

  • Cryptocurrency mixing services

  • Chain-hopping, or converting one cryptocurrency into another to avoid detection

Financial Impact and Laundering

The campaign led to tens of millions of dollars in losses, according to DoJ estimates. Victims not only suffered direct financial theft but also operational downtime, data loss, and public service outages.

The attackers laundered stolen funds using cryptocurrency tumblers and conversion services, making it difficult for law enforcement to trace the flow of assets.

Legal and Social Consequences

Acting U.S. Attorney Daniel P. Bubar emphasized the real-world consequences of cybercrime:

“Cybercrime is not a victimless offense – it is a direct attack on our communities. Gholinejad and his co-conspirators orchestrated a ransomware scheme that disrupted lives, businesses, and local governments, and resulted in losses of tens of millions of dollars from unsuspecting victims and institutions.”

The case reinforces the growing risk posed by international cybercrime groups, especially those who exploit software vulnerabilities to target critical infrastructure and municipal services.

Lessons and Mitigation

This case highlights the importance of proactive cybersecurity practices, especially for government agencies and public institutions. Recommended steps include:

  • Regular patching of known vulnerabilities

  • Network segmentation to limit lateral movement

  • Employee training to identify phishing attempts

  • Zero-trust architectures

  • Behavioral monitoring tools for early detection

Conclusion

The guilty plea of Sina Gholinejad marks a significant step in the international fight against ransomware syndicates. The Robbinhood campaign serves as a stark reminder that ransomware attacks have real, lasting impacts on communities and public trust. Strengthening cybersecurity defenses and fostering global cooperation remain critical to preventing such attacks in the future.