Russian Hackers Debut Simple Ransomware Service
CyberVolk's VolkLocker ransomware uses Telegram for automation but contains a hardcoded master key flaw allowing victims to recover files without paying, researchers said.
7 Articles
7 Articles
Russian Hackers Debut Simple Ransomware Service, But Store Keys In Plain Text
The pro-Russian CyberVolk group resurfaced with a Telegram-based ransomware-as-a-service platform, but fatally undermined its own operation by hardcoding master encryption keys in plaintext. The Register reports: First, the bad news: the CyberVolk 2.x (aka VolkLocker) ransomware-as-a-service operation that launched in late summer. It's run entirely through Telegram, which makes it very easy for affiliates that aren't that tech savvy to lock file…
CyberVolk Ransomware Flaw Lets Victims Recover Data Without Paying
The Flawed Encore of Russian Ransomware Barons In the shadowy world of cybercrime, where digital extortionists operate with impunity from safe havens, a notorious group has staged a comeback that underscores both the persistence and the pitfalls of modern ransomware operations. CyberVolk, a pro-Russian hacktivist collective that first emerged in 2024, has reappeared after a period of dormancy, touting an updated version of its ransomware-as-a-se…
Russian hackers debut simple ransomware service, but store keys in plain text
Operators accidentally left a way for you to get your data back CyberVolk, a pro-Russian hacktivist crew, is back after months of silence with a new ransomware service. There’s some bad news and some good news here.… This article has been indexed from The Register – Security Read the original article: Russian hackers debut simple ransomware service, but store keys in plain text The post Russian hackers debut simple ransomware service, but stor…
Coverage Details
Bias Distribution
- 100% of the sources are Center
Factuality
To view factuality data please Upgrade to Premium



