Friday, April 11, 2025
HomeCyber Security NewsRansomware Developer Mikhail Matveev Arrested in Russia

Ransomware Developer Mikhail Matveev Arrested in Russia

Published on

SIEM as a Service

Follow Us on Google News

Russian authorities have arrested Mikhail Matveev, a notorious Russian hacker linked to multiple ransomware attacks worldwide.

Matveev, who was also known by online aliases such as Wazawaka, Uhodiransomwar, m1x, and Boriselcin, was detained in Kaliningrad, Russia, following an investigation into his alleged cybercrimes.

According to a RIA Novosti source, the Kaliningrad Interior Ministry and the prosecutor’s office have forwarded the case against Matveev to the Central District Court of Kaliningrad for consideration.

- Advertisement - Google News

Key Points:

  • Mikhail Matveev Arrested: Matveev, a notorious Russian hacker known by aliases like Wazawaka and Boriselcin, has been detained in Kaliningrad, Russia, for his involvement in ransomware attacks.
  • Charges and Evidence: He faces charges in Russia under Article 273 of the Criminal Code for creating malicious software intended for unauthorized destruction, blocking, modification, or copying of computer information.
  • Ransomware Activities: Matveev is linked to groups like Hive, LockBit, and Babuk, targeting critical infrastructure such as law enforcement, healthcare, and governmental institutions with ransomware attacks.
  • U.S. Charges and Reward: The U.S. Department of Justice charged Matveev in May 2023, with the State Department offering up to $10 million for information leading to his arrest or conviction.
  • High-Profile Attacks: His attacks include those on Passaic County law enforcement, a New Jersey nonprofit healthcare organization, and the Metropolitan Police Department in Washington, D.C.
  • International Implications: Matveev’s arrest in Russia complicates U.S. efforts to prosecute him, highlighting the challenges of cross-border law enforcement in cybercrime cases.

The charges against him stem from his involvement in developing and deploying sophisticated ransomware programs, which were used to infiltrate and encrypt data of numerous organizations, including law enforcement agencies and healthcare providers, with the intent of extorting ransom payments.

Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar

Matveev’s cyber activities targeted critical infrastructure worldwide, resulting in damages amounting to millions of dollars.

His associations with ransomware groups like Hive, LockBit, and Babuk have been well-documented, and he has openly boasted about his criminal endeavors, claiming protection from local authorities as long as he remained loyal to Russia.

The U.S. Department of Justice had previously charged Matveev in May 2023 for his role in these ransomware schemes, leading to the U.S. State Department announcing a reward of up to $10 million for information leading to his arrest or conviction.

Despite this, his arrest in Russia poses significant challenges to U.S. efforts to prosecute him.

Among the high-profile attacks attributed to Matveev include a ransomware attack on a law enforcement agency in Passaic County, New Jersey, a nonprofit behavioral healthcare organization in Mercer County, New Jersey, and the Metropolitan Police Department in Washington, D.C.

These attacks compromised sensitive data and resulted in substantial financial losses for the victims.

Matveev’s arrest marks a significant event in the ongoing battle against cybercrime, although it remains to be seen how his case will proceed in Russian courts and what implications it might have on international cybercrime investigations.

His detention underscores the complexities of cross-border law enforcement in the digital age, where hackers can operate with relative impunity, often shielded by geopolitical tensions.

Analyze cyber threats with ANYRUN's powerful sandbox. Black Friday Deals : Get up to 3 Free Licenses.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

CISA Issues 10 ICS Advisories Addressing Critical Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has issued ten new Industrial Control Systems...

Sensata Technologies Breached: Ransomware Attack Key Systems

Sensata Technologies Holding PLC, a global leader in sensor solutions and electrical protection, is...

TROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials

Cybersecurity experts at Sublime have uncovered a complex malware campaign revolving around TROX Stealer,...

Chinese eCrime Group Targets Users in 120+ Countries to Steal Banking Credentials

Smishing Triad, a Chinese eCrime group, has launched an extensive operation targeting users across...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

CISA Issues 10 ICS Advisories Addressing Critical Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has issued ten new Industrial Control Systems...

Sensata Technologies Breached: Ransomware Attack Key Systems

Sensata Technologies Holding PLC, a global leader in sensor solutions and electrical protection, is...

TROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials

Cybersecurity experts at Sublime have uncovered a complex malware campaign revolving around TROX Stealer,...