Wished Russian Hacker Linked to Hive and LockBit Ransomware Arrested

Nov 30, 2024Mohit KumarRansomware / Cybercrime

A Russian cybercriminal wished within the U.S. in reference to LockBit and Hive ransomware operations has been arrested by legislation enforcement authorities within the nation.

In line with a information report from Russian media outlet RIA Novosti, Mikhail Pavlovich Matveev has been accused of growing a computer virus designed to encrypt recordsdata and search ransom in return for a decryption key.

“At present, the investigator has collected sufficient evidence, the criminal case with the indictment signed by the prosecutor has been sent to the Central District Court of the city of Kaliningrad for consideration on the merits,” the Russian Ministry of Inner Affairs stated in a press release.

Matveev has been charged beneath Half 1 of Article 273 of the Prison Code of the Russian Federation, which pertains to the creation, use, and distribution of laptop packages that may trigger “destruction, blocking, modification or copying of computer information.”

Cybersecurity

He was charged and indicted by the U.S. authorities in Might 2023 for launching ransomware assaults towards “thousands of victims” within the nation and the world over. He’s additionally identified by varied on-line aliases Wazawaka, m1x, Boriselcin, Uhodiransomwar, and Orange.

Matveev has additionally gone public about his felony actions, stating that “his illicit activities will be tolerated by local authorities provided that he remains loyal to Russia.” He was sanctioned by the U.S. Treasury and has been the topic of a reward of as much as $10 million for any info that would result in his arrest or conviction.

A subsequent report from Swiss cybersecurity agency PRODAFT revealed that Matveev has been main a staff of six penetration testers to hold out the ransomware assaults.

Apart from working as an affiliate for Conti, LockBit, Hive, Trigona, and NoEscape ransomware teams, he’s stated to have had a management-level function with the Babuk ransomware group up till early 2022. Moreover, he’s believed to have deeper ties with the Russian cybercrime group referred to as Evil Corp.

The event comes slightly over a month after 4 members of the now-defunct REvil ransomware operation had been sentenced to a number of years in jail in Russia after they had been convicted of hacking and cash laundering fees.

Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we put up.

Recent articles

Patch Alert: Essential Apache Struts Flaw Discovered, Exploitation Makes an attempt Detected

Dec 18, 2024Ravie LakshmananCyber Assault / Vulnerability Risk actors are...

Meta Fined €251 Million for 2018 Knowledge Breach Impacting 29 Million Accounts

Dec 18, 2024Ravie LakshmananKnowledge Breach / Privateness Meta Platforms, the...