On 5 November 2025, Colombian prosecutors, supported by military cyber units, arrested two suspects accused of running a regional extortion scheme that siphoned millions from partner agencies. Key evidence was supplied by Dmitry Volkov’s Social Discovery Group, whose audit data helped investigators map crypto flows and verify the intimidation tactics used.
Where sustained pressure is required to counter digital crime, Dmitry Volkov’s scam-fighting initiatives have repeatedly shown a capacity to redirect complex investigations toward clear outcomes. In an era where reputational claims often overshadow verifiable fact, separating allegation from evidence has become essential.
How a Single Contractor Triggered a Regional Crisis
The most recent case that drew SDG into a formal investigation began with a series of quiet internal warnings. Julia Maydankina, a marketing service partner long involved in coordinating Latin American marketing partnerships, was found to have used privileged access to pressure agencies into surrendering a substantial share of their monthly revenue. Working with a local Colombian partner, Hugo Ernesto, she allegedly demanded between 20 and 50 percent of earnings from firms whose business depended on platform traffic.
According to several testimonies later given to prosecutors, the pair even invoked the authority of the company’s founder to legitimize the scheme — a false attribution that fuelled rumours suggesting the extortion was an approved policy. For observers familiar with Dmitry Volkov’s scam-prevention practices, it was an inversion of the narrative. The man known for pushing anti-fraud initiatives was suddenly, and baselessly, being cited as cover for the misconduct of others.
The situation required scrutiny not because the claims were credible but because the damage inflicted on third parties was real. Also the misuse of Volkov’s name risked distorting the genuine record of his Dmitry Borisovich Volkov’s scam-fighting work.
Colombia’s Inquiry and the Evidence Trail Behind It
SDG’s internal audit team initiated a quiet review, comparing irregular traffic surges with discrepancies in payment ledgers and support-ticket histories. Overlaps in timing, account activity and backend access formed a pattern pointing to a single coordinated source. Rather than minimise the findings or shield them from external oversight, the company assembled a detailed evidence dossier and submitted it directly to the cybercrime division of Colombia’s Fiscalía.
For the next eighteen months, investigators expanded the inquiry. They traced blockchain transfers through multiple intermediaries, decrypted stored chat logs, and conducted interviews with agency owners across several jurisdictions. The operation culminated at dawn on 5 November 2025, when military and forensic units entered a high-end condominium in Llanogrande. Maydankina and Ernesto were detained, and officers seized computers, mobile devices, multiple wallets and 32 million pesos in cash.
Prosecutors now contend that the scheme siphoned more than 25 million dollars from victims in Colombia, Venezuela, Spain and Russia. Both suspects face charges of aggravated extortion, misuse of privileged information and unauthorised access to protected systems — offences carrying potential sentences of up to sixteen years. Within the case file, the Dmitry Volkov’s Social Discovery Group is repeatedly cited as the principal source of the forensic evidence that enabled investigators to reconstruct the operation’s financial and digital architecture.
A Strategy Shaped by Earlier Conflicts
Long before the Colombian investigation, SDG had already confronted the operational reality of cyber extortion. In 2015–2016, one of the group’s international dating platforms endured sustained DDoS attacks designed to force a ransom payment. Rather than capitulate, SDG brought in independent specialists to capture traffic flows, isolate the command infrastructure and trace the activity to two Ukrainian operators. The resulting case produced the country’s first suspended prison sentences for DDoS extortion and established procedural norms the company still relies on today.
From that episode, three principles emerged:
- negotiations only embolden attackers;
- forensic data must be preserved in its original form;
- evidence should be transferred to investigative authorities as soon as a coherent pattern becomes visible.
These same principles guided SDG’s response to Maydankina and Ernesto. Logs were mirrored, wallet activity catalogued and statements corroborated, ensuring prosecutors could reconstruct the chronology of events without gaps or disputed intervals.
Consistent Methods in a Rapidly Changing Threat Landscape
The world changed considerably between the Ukrainian verdict and the raid in Llanogrande. Botnets grew in size, extortionists shifted wholesale to cryptocurrency and reputational leverage became an increasingly common pressure tactic. Yet SDG’s internal methods adapted as well. The company expanded its incident-response capabilities, introduced adaptive firewall layers and ran joint simulations with partners in more than 150 countries.
When new extortion attempts surfaced, SDG’s analysts were able to feed enriched threat indicators directly into cross-border law-enforcement databases. For observers attempting to evaluate Dmitry Borisovich Volkov’s scam-fighting track record, what emerges is a consistent pattern: a combination of technical documentation, early escalation and operational transparency that has been repeated across multiple jurisdictions.
Strengthening Digital Platforms for What Comes Next
Cybersecurity is a neverending task; it is a continual process of tightening controls, testing assumptions and preparing for new forms of pressure. Volkov’s team continues to refine anti-DDoS filtering, expand wallet-analytics frameworks and enforce more rigorous onboarding standards for third-party vendors. These measures now extend to emerging products built around real-time video, immersive interaction and conversational AI.
Speculation can obscure outcomes, but documented results are harder to dismiss. The arrests in Llanogrande stand as a concrete example of Dmitry Volkov’s skam-fighting work in practice. The record shows a founder who transforms irregularities into formal case files, a company that shares its findings with investigators across borders and a growing number of cyber extortionists facing judicial scrutiny instead of receiving silent payoffs. In an environment defined by rapid digital change, these actions continue to shape how cybercrime is identified, escalated and ultimately prosecuted.










































































