Saturday, December 7, 2024
HomeCyber Security NewsRansomware Developer Mikhail Matveev Arrested in Russia

Ransomware Developer Mikhail Matveev Arrested in Russia

Published on

SIEM as a Service

Russian authorities have arrested Mikhail Matveev, a notorious Russian hacker linked to multiple ransomware attacks worldwide.

Matveev, who was also known by online aliases such as Wazawaka, Uhodiransomwar, m1x, and Boriselcin, was detained in Kaliningrad, Russia, following an investigation into his alleged cybercrimes.

According to a RIA Novosti source, the Kaliningrad Interior Ministry and the prosecutor’s office have forwarded the case against Matveev to the Central District Court of Kaliningrad for consideration.

- Advertisement - SIEM as a Service

Key Points:

  • Mikhail Matveev Arrested: Matveev, a notorious Russian hacker known by aliases like Wazawaka and Boriselcin, has been detained in Kaliningrad, Russia, for his involvement in ransomware attacks.
  • Charges and Evidence: He faces charges in Russia under Article 273 of the Criminal Code for creating malicious software intended for unauthorized destruction, blocking, modification, or copying of computer information.
  • Ransomware Activities: Matveev is linked to groups like Hive, LockBit, and Babuk, targeting critical infrastructure such as law enforcement, healthcare, and governmental institutions with ransomware attacks.
  • U.S. Charges and Reward: The U.S. Department of Justice charged Matveev in May 2023, with the State Department offering up to $10 million for information leading to his arrest or conviction.
  • High-Profile Attacks: His attacks include those on Passaic County law enforcement, a New Jersey nonprofit healthcare organization, and the Metropolitan Police Department in Washington, D.C.
  • International Implications: Matveev’s arrest in Russia complicates U.S. efforts to prosecute him, highlighting the challenges of cross-border law enforcement in cybercrime cases.

The charges against him stem from his involvement in developing and deploying sophisticated ransomware programs, which were used to infiltrate and encrypt data of numerous organizations, including law enforcement agencies and healthcare providers, with the intent of extorting ransom payments.

Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar

Matveev’s cyber activities targeted critical infrastructure worldwide, resulting in damages amounting to millions of dollars.

His associations with ransomware groups like Hive, LockBit, and Babuk have been well-documented, and he has openly boasted about his criminal endeavors, claiming protection from local authorities as long as he remained loyal to Russia.

The U.S. Department of Justice had previously charged Matveev in May 2023 for his role in these ransomware schemes, leading to the U.S. State Department announcing a reward of up to $10 million for information leading to his arrest or conviction.

Despite this, his arrest in Russia poses significant challenges to U.S. efforts to prosecute him.

Among the high-profile attacks attributed to Matveev include a ransomware attack on a law enforcement agency in Passaic County, New Jersey, a nonprofit behavioral healthcare organization in Mercer County, New Jersey, and the Metropolitan Police Department in Washington, D.C.

These attacks compromised sensitive data and resulted in substantial financial losses for the victims.

Matveev’s arrest marks a significant event in the ongoing battle against cybercrime, although it remains to be seen how his case will proceed in Russian courts and what implications it might have on international cybercrime investigations.

His detention underscores the complexities of cross-border law enforcement in the digital age, where hackers can operate with relative impunity, often shielded by geopolitical tensions.

Analyze cyber threats with ANYRUN's powerful sandbox. Black Friday Deals : Get up to 3 Free Licenses.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

DaMAgeCard Attack – New SD Card Attack Lets Hackers Directly Access System Memory

Security researchers have identified a significant vulnerability dubbed "DaMAgeCard Attack" in the new SD...

Deloitte Denies Breach, Claims Only Single System Affected

Ransomware group Brain Cipher claimed to have breached Deloitte UK and threatened to publish...

Top Five Industries Most Frequently Targeted by Phishing Attacks

Researchers analyzed phishing attacks from Q3 2023 to Q3 2024 and identified the top...

Russian BlueAlpha APT Exploits Cloudflare Tunnels to Distribute Custom Malware

BlueAlpha, a Russian state-sponsored group, is actively targeting Ukrainian individuals and organizations by using...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

DaMAgeCard Attack – New SD Card Attack Lets Hackers Directly Access System Memory

Security researchers have identified a significant vulnerability dubbed "DaMAgeCard Attack" in the new SD...

Deloitte Denies Breach, Claims Only Single System Affected

Ransomware group Brain Cipher claimed to have breached Deloitte UK and threatened to publish...

Top Five Industries Most Frequently Targeted by Phishing Attacks

Researchers analyzed phishing attacks from Q3 2023 to Q3 2024 and identified the top...