-2.9 C
Washington
Monday, February 3, 2025

Wanted Russian Hacker Linked to Hive and LockBit Ransomware Arrested

Must read

A Russian cybercriminal needed within the U.S. in reference to LockBit and Hive ransomware operations has been arrested by legislation enforcement authorities within the nation.

In accordance with a information report from Russian media outlet RIA Novosti, Mikhail Pavlovich Matveev has been accused of creating a trojan horse designed to encrypt information and search ransom in return for a decryption key.

“At current, the investigator has collected ample proof, the prison case with the indictment signed by the prosecutor has been despatched to the Central District Court docket of town of Kaliningrad for consideration on the deserves,” the Russian Ministry of Inside Affairs stated in a press release.

Matveev has been charged beneath Half 1 of Article 273 of the Prison Code of the Russian Federation, which pertains to the creation, use, and distribution of pc packages that may trigger “destruction, blocking, modification or copying of pc data.”

He was charged and indicted by the U.S. authorities in Might 2023 for launching ransomware assaults towards “1000’s of victims” within the nation and internationally. He’s additionally identified by varied on-line aliases Wazawaka, m1x, Boriselcin, Uhodiransomwar, and Orange.

Matveev has additionally gone public about his prison actions, stating that “his illicit actions might be tolerated by native authorities supplied that he stays loyal to Russia.” He was sanctioned by the U.S. Treasury and has been the topic of a reward of as much as $10 million for any data that might result in his arrest or conviction.

A subsequent report from Swiss cybersecurity agency PRODAFT revealed that Matveev has been main a workforce of six penetration testers to hold out the ransomware assaults.

See also  Pick up 41 Warhammer 40K TTRPG books for just $25 at Humble

In addition to working as an affiliate for Conti, LockBit, Hive, Trigona, and NoEscape ransomware teams, he’s stated to have had a management-level function with the Babuk ransomware group up till early 2022. Moreover, he’s believed to have deeper ties with the Russian cybercrime group generally known as Evil Corp.

The event comes a bit over a month after 4 members of the now-defunct REvil ransomware operation had been sentenced to a number of years in jail in Russia after they had been convicted of hacking and cash laundering costs.

Related News

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest News