CyberVolk launches VolkLocker ransomware targeting Linux and Windows

The pro-Russia hacktivist group CyberVolk has reemerged with a new ransomware-as-a-service platform called VolkLocker, supporting both Linux and Windows systems. First documented in 2024 by SentinelOne, the group returned after a period of inactivity caused by Telegram bans. Despite advanced automation via Telegram bots, the malware features significant encryption flaws that could allow victims to recover files without payment.

CyberVolk, a pro-Russia hacktivist group aligned with Russian interests, first gained attention in late 2024 through attacks using various ransomware families. After going silent due to Telegram enforcement actions earlier in the year, the group resurfaced in August 2025 with VolkLocker, a ransomware-as-a-service (RaaS) operation written in Golang. This cross-platform malware expands the group's reach by targeting both Windows and Linux environments, enabling operators to build variants with simple inputs like a Bitcoin address, Telegram bot token, chat ID, encryption deadline, custom file extension, and self-destruct options.

VolkLocker relies heavily on Telegram for automation, with the bot 'CyberVolk_Kbot' handling victim communications, infection control, and decryption management. The ransomware uses AES-256 in Galois/Counter Mode (GCM) encryption, employing a 32-byte master key encoded as a 64-character hex string. However, a critical flaw persists: the same hardcoded master key is used for all files and saved in plaintext within a file containing the victim ID and attacker's Bitcoin address. Security researchers from SentinelOne attribute this to a developer test function accidentally left in production builds, highlighting the group's immature quality control.

On Windows, VolkLocker attempts privilege escalation by exploiting the 'ms-settings' User Account Control bypass, modifying the registry key HKCU\Software\Classes\ms-settings\shell\open\command to run with administrator rights. It disables Windows Defender and recovery tools via registry edits and PowerShell, blocks access to Task Manager, Command Prompt, and Registry Editor, and ensures persistence by copying itself to directories like %APPDATA%, %PUBLIC%\Documents, and %ProgramData%\Microsoft\Network. The malware also performs environmental discovery, enumerating processes to detect virtual machines such as VirtualBox, VMware, and QEMU, and checking MAC addresses against vendor prefixes to evade sandboxes.

A dynamic HTML ransom note appears with a 48-hour countdown timer, though the visual is cosmetic. After the deadline, an independent routine corrupts processes, deletes user directories, wipes Volume Shadow Copies, and triggers a Blue Screen of Death using the NtRaiseHardError() API. Similar encryption and Telegram controls apply to Linux variants. Base builds lack obfuscation, recommending UPX packing for operators.

Indicators of compromise include Windows sample hash dcd859e5b14657b733dfb0c22272b82623466321, Linux sample 0948e75c94046f0893844e3b891556ea48188608, Bitcoin address bc1qujgdzl0v82gh9pvmg3ftgnknl336ku26nnp0vy, and Telegram bot @CyberVolk_Kbot. While the flaws undermine its effectiveness, VolkLocker demonstrates how politically motivated actors are streamlining ransomware via messaging platforms.

Related Articles

Illustration of a hacker deploying Qilin ransomware using Linux binaries on Windows systems, showing code and alerts in a dark ops center.
Image generated by AI

Qilin ransomware deploys Linux binaries against Windows systems

Reported by AI Image generated by AI

The Qilin ransomware group, also known as Agenda, has developed a hybrid attack using Linux payloads on Windows hosts to evade detection. By abusing legitimate remote management tools and exploiting vulnerable drivers, attackers disable defenses and target backups. This cross-platform tactic highlights evolving ransomware sophistication.

SentinelOne researchers have disclosed a critical flaw in CyberVolk's new VolkLocker ransomware-as-a-service: a hardcoded master key stored in plaintext, enabling victims to decrypt files without ransom payment. Following the group's August 2025 relaunch after Telegram bans, this weakness underscores quality issues in their RaaS ecosystem.

Reported by AI

A new ransomware-as-a-service operation called VanHelsing emerged on March 7, 2025, quickly claiming at least three victims. It supports attacks on Windows, Linux, BSD, ARM, and ESXi systems, with affiliates retaining 80% of ransoms after a $5,000 deposit. The group prohibits targeting entities in the Commonwealth of Independent States.

A new botnet known as GoBruteforcer has emerged, focusing on brute-force attacks against Linux servers. The threat was reported by IT Security News on January 12, 2026. Details highlight the botnet's specific targeting of these systems.

Reported by AI

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

Security researchers at Cyble have discovered a new Linux malware called ClipXDaemon, which hijacks cryptocurrency wallet addresses by altering clipboard content on X11-based systems. The malware operates without command-and-control servers, monitoring and replacing addresses in real time to redirect funds to attackers. It uses a multi-stage infection process and employs stealth techniques to evade detection.

Reported by AI

The Hacker News has released its latest ThreatsDay Bulletin, focusing on various cybersecurity issues. The bulletin covers topics such as Kali Linux combined with Claude, Chrome crash traps, WinRAR flaws, and activities related to LockBit. It also includes over 15 additional stories on emerging threats.

 

 

 

This website uses cookies

We use cookies for analytics to improve our site. Read our privacy policy for more information.
Decline