CyberVolk's VolkLocker hampered by plaintext master key flaw

SentinelOne researchers have disclosed a critical flaw in CyberVolk's new VolkLocker ransomware-as-a-service: a hardcoded master key stored in plaintext, enabling victims to decrypt files without ransom payment. Following the group's August 2025 relaunch after Telegram bans, this weakness underscores quality issues in their RaaS ecosystem.

As detailed in prior coverage of VolkLocker's launch, the pro-Russia hacktivist group CyberVolk—known for DDoS and ransomware attacks since 2024—reemerged with this Golang-based RaaS targeting Linux/VMware ESXi and Windows via Telegram builder bots.

The ransomware uses AES-256 in Galois/Counter Mode with a 32-byte master key from a 64-character hex string, applying it uniformly across files (renamed .locked or .cvolk) alongside a random 12-byte nonce IV. Critically, it saves this key in a plaintext file, system_backup.key, in the %TEMP% folder, which persists and allows recovery.

"A test artifact inadvertently shipped in production builds," SentinelOne researchers noted, advising victims to extract the key for decryption.

RaaS access costs $800-$1,100 per OS architecture or $1,600-$2,200 for both, with a Telegram bot for customization. In November 2025, CyberVolk also offered a remote access trojan and keylogger for $500 each.

SentinelOne addressed concerns over early disclosure: "This isn’t a core encryption flaw but a testing artifact from incompetent operators, representative of the ecosystem CyberVolk aims to foster. It’s not reliable beyond specific cases."

While aiding current victims, this may spur fixes, enhancing future VolkLocker versions.

Makala yanayohusiana

Realistic illustration of a computer screen showing the VanHelsing ransomware attack targeting multiple operating systems, suitable for a cybersecurity news article.
Picha iliyoundwa na AI

VanHelsing ransomware RaaS targets multiple platforms

Imeripotiwa na AI Picha iliyoundwa na AI

A new ransomware-as-a-service operation called VanHelsing emerged on March 7, 2025, quickly claiming at least three victims. It supports attacks on Windows, Linux, BSD, ARM, and ESXi systems, with affiliates retaining 80% of ransoms after a $5,000 deposit. The group prohibits targeting entities in the Commonwealth of Independent States.

The pro-Russia hacktivist group CyberVolk has reemerged with a new ransomware-as-a-service platform called VolkLocker, supporting both Linux and Windows systems. First documented in 2024 by SentinelOne, the group returned after a period of inactivity caused by Telegram bans. Despite advanced automation via Telegram bots, the malware features significant encryption flaws that could allow victims to recover files without payment.

Imeripotiwa na AI

Threat actor zeta88 is promoting a new ransomware-as-a-service operation called The Gentlemen's RaaS on hacking forums, targeting Windows, Linux, and ESXi systems. The platform offers affiliates 90 percent of ransom payments and features cross-platform encryption tools developed in Go and C. This development highlights the ongoing commercialization of sophisticated ransomware targeting enterprise environments.

Threat actors are shifting from traditional languages like C and C++ to modern ones such as Rust, enabling cross-platform malware development. A new Rust-based information stealer called Luca has emerged, released openly to the public. This development highlights growing use of Rust in malware, posing new challenges for cybersecurity defenders.

Imeripotiwa na AI

Hackers have targeted Waltio, a French cryptocurrency accounting platform, demanding a ransom after stealing emails and tax reports from 50,000 customers. The company reported the incident on January 21, 2026, stating that no passwords or highly sensitive data were compromised. French authorities are now investigating the sophisticated cyberattack.

Cybercriminals stole a record $2.7 billion in cryptocurrency in 2025, according to blockchain analytics firms Chainalysis and TRM Labs. North Korean hackers accounted for over $2 billion of the total, marking a 51% increase from the previous year. The largest single incident was a $1.4 billion breach at the Bybit exchange.

Imeripotiwa na AI

A critical vulnerability in React Server Components, known as React2Shell and tracked as CVE-2025-55182, is being actively exploited to deploy a new Linux backdoor called PeerBlight. This malware turns compromised servers into covert proxy and command-and-control nodes. Attackers use a single crafted HTTP request to execute arbitrary code on vulnerable Next.js and React applications.

Jumatano, 21. Mwezi wa kwanza 2026, 17:17:18

Attackers hijack Linux Snap Store apps to steal crypto phrases

Jumamosi, 17. Mwezi wa kwanza 2026, 01:38:55

Crypto investor loses $282 million in Trezor wallet scam

Jumatano, 14. Mwezi wa kwanza 2026, 21:57:45

Check Point discovers advanced VoidLink Linux malware for clouds

Alhamisi, 1. Mwezi wa kwanza 2026, 11:23:01

Trust Wallet confirms second Shai-Hulud supply-chain attack

Jumapili, 28. Mwezi wa kumi na mbili 2025, 03:51:50

Russian Networks Linked to Laundering of LastPass Breach's $35M in Stolen Crypto

Alhamisi, 25. Mwezi wa kumi na mbili 2025, 10:53:34

LastPass 2022 breach enables years of cryptocurrency thefts

Jumamosi, 13. Mwezi wa kumi na mbili 2025, 23:54:19

China-nexus groups and cybercriminals ramp up React2Shell exploits

Ijumaa, 12. Mwezi wa kumi na mbili 2025, 08:50:00

Russian cybercriminals release new ransomware

Jumatano, 29. Mwezi wa kumi 2025, 11:29:39

Malicious npm packages steal developer credentials on multiple platforms

Jumatatu, 27. Mwezi wa kumi 2025, 10:24:45

Qilin ransomware deploys Linux binaries against Windows systems

 

 

 

Tovuti hii inatumia vidakuzi

Tunatumia vidakuzi kwa uchambuzi ili kuboresha tovuti yetu. Soma sera ya faragha yetu kwa maelezo zaidi.
Kataa