"Behind the Scenes of Matveev's Ransomware Empire: Tactics and Team"

Cybersecurity researchers at PRODAFT have detailed the inner workings of the ransomware operation led by Mikhail Pavlovich Matveev, a Russian national indicted earlier this year by the US government for his alleged role in executing thousands of attacks worldwide. Matveev, who goes by the aliases Wazawaka, m1x, Boriselcin, Uhodiransomwar, Orange, and waza, is alleged to have played a major role in the development and distribution of LockBit, Babuk, and Hive ransomware variants since at least June 2020. PRODAFT's findings are based on data collected between April and December 2023 by intercepting thousands of communication logs between different threat actors associated with the ransomware variants. This article continues to discuss findings regarding the ransomware operation led by Matveev.

THN reports "Behind the Scenes of Matveev's Ransomware Empire: Tactics and Team"

Submitted by grigby1

Submitted by grigby1 CPVI on