Categories: Cyber Security News

Ransomware Developer Mikhail Matveev Arrested in Russia

Russian authorities have arrested Mikhail Matveev, a notorious Russian hacker linked to multiple ransomware attacks worldwide.

Matveev, who was also known by online aliases such as Wazawaka, Uhodiransomwar, m1x, and Boriselcin, was detained in Kaliningrad, Russia, following an investigation into his alleged cybercrimes.

According to a RIA Novosti source, the Kaliningrad Interior Ministry and the prosecutor’s office have forwarded the case against Matveev to the Central District Court of Kaliningrad for consideration.

Key Points:

  • Mikhail Matveev Arrested: Matveev, a notorious Russian hacker known by aliases like Wazawaka and Boriselcin, has been detained in Kaliningrad, Russia, for his involvement in ransomware attacks.
  • Charges and Evidence: He faces charges in Russia under Article 273 of the Criminal Code for creating malicious software intended for unauthorized destruction, blocking, modification, or copying of computer information.
  • Ransomware Activities: Matveev is linked to groups like Hive, LockBit, and Babuk, targeting critical infrastructure such as law enforcement, healthcare, and governmental institutions with ransomware attacks.
  • U.S. Charges and Reward: The U.S. Department of Justice charged Matveev in May 2023, with the State Department offering up to $10 million for information leading to his arrest or conviction.
  • High-Profile Attacks: His attacks include those on Passaic County law enforcement, a New Jersey nonprofit healthcare organization, and the Metropolitan Police Department in Washington, D.C.
  • International Implications: Matveev’s arrest in Russia complicates U.S. efforts to prosecute him, highlighting the challenges of cross-border law enforcement in cybercrime cases.

The charges against him stem from his involvement in developing and deploying sophisticated ransomware programs, which were used to infiltrate and encrypt data of numerous organizations, including law enforcement agencies and healthcare providers, with the intent of extorting ransom payments.

Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar

Matveev’s cyber activities targeted critical infrastructure worldwide, resulting in damages amounting to millions of dollars.

His associations with ransomware groups like Hive, LockBit, and Babuk have been well-documented, and he has openly boasted about his criminal endeavors, claiming protection from local authorities as long as he remained loyal to Russia.

The U.S. Department of Justice had previously charged Matveev in May 2023 for his role in these ransomware schemes, leading to the U.S. State Department announcing a reward of up to $10 million for information leading to his arrest or conviction.

Despite this, his arrest in Russia poses significant challenges to U.S. efforts to prosecute him.

Among the high-profile attacks attributed to Matveev include a ransomware attack on a law enforcement agency in Passaic County, New Jersey, a nonprofit behavioral healthcare organization in Mercer County, New Jersey, and the Metropolitan Police Department in Washington, D.C.

These attacks compromised sensitive data and resulted in substantial financial losses for the victims.

Matveev’s arrest marks a significant event in the ongoing battle against cybercrime, although it remains to be seen how his case will proceed in Russian courts and what implications it might have on international cybercrime investigations.

His detention underscores the complexities of cross-border law enforcement in the digital age, where hackers can operate with relative impunity, often shielded by geopolitical tensions.

Analyze cyber threats with ANYRUN's powerful sandbox. Black Friday Deals : Get up to 3 Free Licenses.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Hackers Weaponize KeePass Password Manager to Spread Malware and Steal Passwords

Threat actors have successfully exploited the widely-used open-source password manager, KeePass, to spread malware and…

3 minutes ago

Marks & Spencer Confirms Customer Data Breach in Recent Cyber Attack

British retail giant Marks & Spencer has officially confirmed that customer personal data was compromised…

3 hours ago

Zoom Workplace Apps Flaws Allow Hackers to Gain Elevated Access

Zoom has released multiple security bulletins addressing seven newly discovered vulnerabilities in Zoom Workplace Apps,…

3 hours ago

PoC Exploit Published for macOS Sandbox Escape Vulnerability (CVE-2025-31258)

Security researchers have disclosed a new macOS sandbox escape vulnerability tracked as CVE-2025-31258, accompanied by…

3 hours ago

Four Hackers Caught Exploiting Old Routers as Proxy Servers

U.S. authorities unsealed charges against four foreign nationals accused of operating a global cybercrime scheme…

3 hours ago

F5 BIG-IP Vulnerability Allows Remote Command Execution

Critical security vulnerability in F5 BIG-IP systems has been discovered that allows authenticated administrators to…

3 hours ago