CyberVolk's VolkLocker hampered by plaintext master key flaw

SentinelOne researchers have disclosed a critical flaw in CyberVolk's new VolkLocker ransomware-as-a-service: a hardcoded master key stored in plaintext, enabling victims to decrypt files without ransom payment. Following the group's August 2025 relaunch after Telegram bans, this weakness underscores quality issues in their RaaS ecosystem.

As detailed in prior coverage of VolkLocker's launch, the pro-Russia hacktivist group CyberVolk—known for DDoS and ransomware attacks since 2024—reemerged with this Golang-based RaaS targeting Linux/VMware ESXi and Windows via Telegram builder bots.

The ransomware uses AES-256 in Galois/Counter Mode with a 32-byte master key from a 64-character hex string, applying it uniformly across files (renamed .locked or .cvolk) alongside a random 12-byte nonce IV. Critically, it saves this key in a plaintext file, system_backup.key, in the %TEMP% folder, which persists and allows recovery.

"A test artifact inadvertently shipped in production builds," SentinelOne researchers noted, advising victims to extract the key for decryption.

RaaS access costs $800-$1,100 per OS architecture or $1,600-$2,200 for both, with a Telegram bot for customization. In November 2025, CyberVolk also offered a remote access trojan and keylogger for $500 each.

SentinelOne addressed concerns over early disclosure: "This isn’t a core encryption flaw but a testing artifact from incompetent operators, representative of the ecosystem CyberVolk aims to foster. It’s not reliable beyond specific cases."

While aiding current victims, this may spur fixes, enhancing future VolkLocker versions.

Relaterede artikler

Realistic depiction of Vykar backup tool interface demonstrating superior speed over competitors Borg and Restic, with encryption and deduplication features.
Billede genereret af AI

BorgBase team releases Vykar open-source backup tool

Rapporteret af AI Billede genereret af AI

The BorgBase team has introduced Vykar, a new open-source backup tool written in Rust that outperforms Borg, Restic, and others in speed tests. Released under the GPL-3.0 license, it features encryption, deduplication, and a built-in desktop GUI. Performance benchmarks show it completing backups faster while using more memory.

A newly published zero-day exploit allows attackers with physical access to bypass BitLocker encryption on Windows 11 devices in seconds. The attack, named YellowKey, targets the default TPM-only configuration and grants full access to encrypted drives via a simple USB-based method.

Rapporteret af AI

New research from ETH Zurich and USI Lugano reveals vulnerabilities in popular password managers, challenging their assurances that servers cannot access user vaults. The study analyzed Bitwarden, Dashlane, and LastPass, identifying ways attackers with server control could steal or modify data, particularly when features like account recovery or sharing are enabled. Companies have begun patching the issues while defending their overall security practices.

Dette websted bruger cookies

Vi bruger cookies til analyse for at forbedre vores side. Læs vores privatlivspolitik for mere information.
Afvis