Aspect | Details |
---|---|
Threat Actors | Mikhail Matveev (Wazawaka), linked to Babuk, Conti, DarkSide, Hive, and LockBit ransomware groups. |
Campaign Overview | Charged for developing ransomware to blackmail commercial organizations and encrypt their data for profit. |
Target Regions/Victims | U.S. organizations, including the Washington D.C. Metropolitan Police Department. |
Methodology | Creation and deployment of ransomware targeting sensitive organizational data, demanding ransoms for decryption. |
Product Targeted | Data systems of commercial organizations; Metropolitan Police Department’s servers. |
Malware Reference | Babuk ransomware; other unspecified ransomware developed for financial gain. |
Tools Used | Custom-built ransomware for encrypting victim data and extorting payment. |
Vulnerabilities Exploited | Exploited organizational security weaknesses to infiltrate and encrypt data. |
TTPs | Ransomware deployment, encryption of organizational data, ransom demands, and leveraging media coverage to threaten data exposure. |
Attribution | Charged in Russia under Article 273; previously indicted by the U.S. and placed on the FBI Cyber Most Wanted list. |
Recommendations | Strengthen data protection policies, improve organizational cybersecurity, implement ransomware-specific defenses, and engage in international collaboration. |
Source | The Record |
Read full article: https://therecord.media/wazawaka-mikhail-matveev-reportedly-arrested-russia
Disclaimer: The above summary has been generated by an AI language model
Leave a Reply