CyberVolk launches VolkLocker ransomware targeting Linux and Windows

The pro-Russia hacktivist group CyberVolk has reemerged with a new ransomware-as-a-service platform called VolkLocker, supporting both Linux and Windows systems. First documented in 2024 by SentinelOne, the group returned after a period of inactivity caused by Telegram bans. Despite advanced automation via Telegram bots, the malware features significant encryption flaws that could allow victims to recover files without payment.

CyberVolk, a pro-Russia hacktivist group aligned with Russian interests, first gained attention in late 2024 through attacks using various ransomware families. After going silent due to Telegram enforcement actions earlier in the year, the group resurfaced in August 2025 with VolkLocker, a ransomware-as-a-service (RaaS) operation written in Golang. This cross-platform malware expands the group's reach by targeting both Windows and Linux environments, enabling operators to build variants with simple inputs like a Bitcoin address, Telegram bot token, chat ID, encryption deadline, custom file extension, and self-destruct options.

VolkLocker relies heavily on Telegram for automation, with the bot 'CyberVolk_Kbot' handling victim communications, infection control, and decryption management. The ransomware uses AES-256 in Galois/Counter Mode (GCM) encryption, employing a 32-byte master key encoded as a 64-character hex string. However, a critical flaw persists: the same hardcoded master key is used for all files and saved in plaintext within a file containing the victim ID and attacker's Bitcoin address. Security researchers from SentinelOne attribute this to a developer test function accidentally left in production builds, highlighting the group's immature quality control.

On Windows, VolkLocker attempts privilege escalation by exploiting the 'ms-settings' User Account Control bypass, modifying the registry key HKCU\Software\Classes\ms-settings\shell\open\command to run with administrator rights. It disables Windows Defender and recovery tools via registry edits and PowerShell, blocks access to Task Manager, Command Prompt, and Registry Editor, and ensures persistence by copying itself to directories like %APPDATA%, %PUBLIC%\Documents, and %ProgramData%\Microsoft\Network. The malware also performs environmental discovery, enumerating processes to detect virtual machines such as VirtualBox, VMware, and QEMU, and checking MAC addresses against vendor prefixes to evade sandboxes.

A dynamic HTML ransom note appears with a 48-hour countdown timer, though the visual is cosmetic. After the deadline, an independent routine corrupts processes, deletes user directories, wipes Volume Shadow Copies, and triggers a Blue Screen of Death using the NtRaiseHardError() API. Similar encryption and Telegram controls apply to Linux variants. Base builds lack obfuscation, recommending UPX packing for operators.

Indicators of compromise include Windows sample hash dcd859e5b14657b733dfb0c22272b82623466321, Linux sample 0948e75c94046f0893844e3b891556ea48188608, Bitcoin address bc1qujgdzl0v82gh9pvmg3ftgnknl336ku26nnp0vy, and Telegram bot @CyberVolk_Kbot. While the flaws undermine its effectiveness, VolkLocker demonstrates how politically motivated actors are streamlining ransomware via messaging platforms.

Articoli correlati

Illustration of a hacker deploying Qilin ransomware using Linux binaries on Windows systems, showing code and alerts in a dark ops center.
Immagine generata dall'IA

Qilin ransomware deploys Linux binaries against Windows systems

Riportato dall'IA Immagine generata dall'IA

The Qilin ransomware group, also known as Agenda, has developed a hybrid attack using Linux payloads on Windows hosts to evade detection. By abusing legitimate remote management tools and exploiting vulnerable drivers, attackers disable defenses and target backups. This cross-platform tactic highlights evolving ransomware sophistication.

SentinelOne researchers have disclosed a critical flaw in CyberVolk's new VolkLocker ransomware-as-a-service: a hardcoded master key stored in plaintext, enabling victims to decrypt files without ransom payment. Following the group's August 2025 relaunch after Telegram bans, this weakness underscores quality issues in their RaaS ecosystem.

Riportato dall'IA

A new ransomware-as-a-service operation called VanHelsing emerged on March 7, 2025, quickly claiming at least three victims. It supports attacks on Windows, Linux, BSD, ARM, and ESXi systems, with affiliates retaining 80% of ransoms after a $5,000 deposit. The group prohibits targeting entities in the Commonwealth of Independent States.

Researchers have attributed a failed cyberattack on Poland's electric grid to Russian state hackers, coinciding with the 10th anniversary of a similar assault on Ukraine. The wiper malware aimed to disrupt power distribution but did not succeed in knocking out electricity. Security firm ESET linked the incident to the notorious Sandworm group.

Riportato dall'IA

Microsoft has introduced a policy involving BitLocker keys that is prompting users to consider switching to Linux. The move is seen as a significant drawback for Windows users concerned about data security and privacy.

Building on earlier PeerBlight attacks, Google Threat Intelligence reports exploitation of the React2Shell vulnerability (CVE-2025-55182) by China-nexus clusters and financially motivated actors deploying backdoors and cryptocurrency miners on vulnerable React and Next.js systems.

Riportato dall'IA

Ongoing exploitation of the React2Shell vulnerability (CVE-2025-55182)—previously detailed in coverage of China-nexus and cybercriminal campaigns—now includes widespread Linux backdoor installations, arbitrary command execution, and large-scale theft of cloud credentials.

 

 

 

Questo sito web utilizza i cookie

Utilizziamo i cookie per l'analisi per migliorare il nostro sito. Leggi la nostra politica sulla privacy per ulteriori informazioni.
Rifiuta