CyberVolk launches VolkLocker ransomware targeting Linux and Windows

The pro-Russia hacktivist group CyberVolk has reemerged with a new ransomware-as-a-service platform called VolkLocker, supporting both Linux and Windows systems. First documented in 2024 by SentinelOne, the group returned after a period of inactivity caused by Telegram bans. Despite advanced automation via Telegram bots, the malware features significant encryption flaws that could allow victims to recover files without payment.

CyberVolk, a pro-Russia hacktivist group aligned with Russian interests, first gained attention in late 2024 through attacks using various ransomware families. After going silent due to Telegram enforcement actions earlier in the year, the group resurfaced in August 2025 with VolkLocker, a ransomware-as-a-service (RaaS) operation written in Golang. This cross-platform malware expands the group's reach by targeting both Windows and Linux environments, enabling operators to build variants with simple inputs like a Bitcoin address, Telegram bot token, chat ID, encryption deadline, custom file extension, and self-destruct options.

VolkLocker relies heavily on Telegram for automation, with the bot 'CyberVolk_Kbot' handling victim communications, infection control, and decryption management. The ransomware uses AES-256 in Galois/Counter Mode (GCM) encryption, employing a 32-byte master key encoded as a 64-character hex string. However, a critical flaw persists: the same hardcoded master key is used for all files and saved in plaintext within a file containing the victim ID and attacker's Bitcoin address. Security researchers from SentinelOne attribute this to a developer test function accidentally left in production builds, highlighting the group's immature quality control.

On Windows, VolkLocker attempts privilege escalation by exploiting the 'ms-settings' User Account Control bypass, modifying the registry key HKCU\Software\Classes\ms-settings\shell\open\command to run with administrator rights. It disables Windows Defender and recovery tools via registry edits and PowerShell, blocks access to Task Manager, Command Prompt, and Registry Editor, and ensures persistence by copying itself to directories like %APPDATA%, %PUBLIC%\Documents, and %ProgramData%\Microsoft\Network. The malware also performs environmental discovery, enumerating processes to detect virtual machines such as VirtualBox, VMware, and QEMU, and checking MAC addresses against vendor prefixes to evade sandboxes.

A dynamic HTML ransom note appears with a 48-hour countdown timer, though the visual is cosmetic. After the deadline, an independent routine corrupts processes, deletes user directories, wipes Volume Shadow Copies, and triggers a Blue Screen of Death using the NtRaiseHardError() API. Similar encryption and Telegram controls apply to Linux variants. Base builds lack obfuscation, recommending UPX packing for operators.

Indicators of compromise include Windows sample hash dcd859e5b14657b733dfb0c22272b82623466321, Linux sample 0948e75c94046f0893844e3b891556ea48188608, Bitcoin address bc1qujgdzl0v82gh9pvmg3ftgnknl336ku26nnp0vy, and Telegram bot @CyberVolk_Kbot. While the flaws undermine its effectiveness, VolkLocker demonstrates how politically motivated actors are streamlining ransomware via messaging platforms.

Related Articles

Realistic depiction of Vykar backup tool interface demonstrating superior speed over competitors Borg and Restic, with encryption and deduplication features.
Image generated by AI

BorgBase team releases Vykar open-source backup tool

Reported by AI Image generated by AI

The BorgBase team has introduced Vykar, a new open-source backup tool written in Rust that outperforms Borg, Restic, and others in speed tests. Released under the GPL-3.0 license, it features encryption, deduplication, and a built-in desktop GUI. Performance benchmarks show it completing backups faster while using more memory.

Researchers at LevelBlue have identified a new variant of the SysUpdate malware aimed at Linux systems during a digital forensics and incident response engagement. The malware disguises itself as a legitimate system service and employs advanced encryption for command-and-control communications. By reverse-engineering it, the team created tools to decrypt its traffic more quickly.

Reported by AI

A new variant of the SysUpdate malware has been discovered targeting Linux systems, featuring advanced encryption for command-and-control communications. Security researchers at LevelBlue identified the threat during a digital forensics engagement and developed a tool to decrypt its traffic. The malware disguises itself as a legitimate system service to evade detection.

A critical Linux vulnerability known as CopyFail, tracked as CVE-2026-31431, allows attackers to gain root access on systems running kernels since 2017. Publicly released exploit code has heightened risks for data centers and personal devices. Ubuntu's infrastructure has been offline for over a day due to a DDoS attack, hampering security communications.

This website uses cookies

We use cookies for analytics to improve our site. Read our privacy policy for more information.
Decline