Monday, December 2, 2024
HomeCyber Security NewsRansomware Developer Mikhail Matveev Arrested in Russia

Ransomware Developer Mikhail Matveev Arrested in Russia

Published on

Russian authorities have arrested Mikhail Matveev, a notorious Russian hacker linked to multiple ransomware attacks worldwide.

Matveev, who was also known by online aliases such as Wazawaka, Uhodiransomwar, m1x, and Boriselcin, was detained in Kaliningrad, Russia, following an investigation into his alleged cybercrimes.

According to a RIA Novosti source, the Kaliningrad Interior Ministry and the prosecutor’s office have forwarded the case against Matveev to the Central District Court of Kaliningrad for consideration.

- Advertisement - SIEM as a Service

Key Points:

  • Mikhail Matveev Arrested: Matveev, a notorious Russian hacker known by aliases like Wazawaka and Boriselcin, has been detained in Kaliningrad, Russia, for his involvement in ransomware attacks.
  • Charges and Evidence: He faces charges in Russia under Article 273 of the Criminal Code for creating malicious software intended for unauthorized destruction, blocking, modification, or copying of computer information.
  • Ransomware Activities: Matveev is linked to groups like Hive, LockBit, and Babuk, targeting critical infrastructure such as law enforcement, healthcare, and governmental institutions with ransomware attacks.
  • U.S. Charges and Reward: The U.S. Department of Justice charged Matveev in May 2023, with the State Department offering up to $10 million for information leading to his arrest or conviction.
  • High-Profile Attacks: His attacks include those on Passaic County law enforcement, a New Jersey nonprofit healthcare organization, and the Metropolitan Police Department in Washington, D.C.
  • International Implications: Matveev’s arrest in Russia complicates U.S. efforts to prosecute him, highlighting the challenges of cross-border law enforcement in cybercrime cases.

The charges against him stem from his involvement in developing and deploying sophisticated ransomware programs, which were used to infiltrate and encrypt data of numerous organizations, including law enforcement agencies and healthcare providers, with the intent of extorting ransom payments.

Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar

Matveev’s cyber activities targeted critical infrastructure worldwide, resulting in damages amounting to millions of dollars.

His associations with ransomware groups like Hive, LockBit, and Babuk have been well-documented, and he has openly boasted about his criminal endeavors, claiming protection from local authorities as long as he remained loyal to Russia.

The U.S. Department of Justice had previously charged Matveev in May 2023 for his role in these ransomware schemes, leading to the U.S. State Department announcing a reward of up to $10 million for information leading to his arrest or conviction.

Despite this, his arrest in Russia poses significant challenges to U.S. efforts to prosecute him.

Among the high-profile attacks attributed to Matveev include a ransomware attack on a law enforcement agency in Passaic County, New Jersey, a nonprofit behavioral healthcare organization in Mercer County, New Jersey, and the Metropolitan Police Department in Washington, D.C.

These attacks compromised sensitive data and resulted in substantial financial losses for the victims.

Matveev’s arrest marks a significant event in the ongoing battle against cybercrime, although it remains to be seen how his case will proceed in Russian courts and what implications it might have on international cybercrime investigations.

His detention underscores the complexities of cross-border law enforcement in the digital age, where hackers can operate with relative impunity, often shielded by geopolitical tensions.

Analyze cyber threats with ANYRUN's powerful sandbox. Black Friday Deals : Get up to 3 Free Licenses.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Linux 6.13-rc1 Released: What’s New!

In a recent announcement, Linus Torvalds, the creator of Linux, officially released the first...

Windows Server 2012 0-day Vulnerability Exposes Critical Security Flaw

Cybersecurity researchers have identified a critical 0-day vulnerability in Windows Server 2012 and Server...

Apple Safari JavaScriptCore Remote Code Execution Flaw Exploited in the Wild

A critical vulnerability identified as CVE-2024-44308 has been actively exploited in the wild, affecting...

MediaTek Processor Vulnerabilities Let Attackers Escalate Privileges

Several vulnerabilities affecting MediaTek processors have been identified, potentially allowing attackers to escalate privileges...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Linux 6.13-rc1 Released: What’s New!

In a recent announcement, Linus Torvalds, the creator of Linux, officially released the first...

Windows Server 2012 0-day Vulnerability Exposes Critical Security Flaw

Cybersecurity researchers have identified a critical 0-day vulnerability in Windows Server 2012 and Server...

Apple Safari JavaScriptCore Remote Code Execution Flaw Exploited in the Wild

A critical vulnerability identified as CVE-2024-44308 has been actively exploited in the wild, affecting...