Key Details | Information |
---|---|
Threat Actor | Mikhail Pavlovich Matveev (aka Wazawaka, Uhodiransomwar, m1x, Boriselcin) |
Campaign Overview | Matveev arrested and indicted for developing malware and involvement with multiple hacking groups. |
Target Regions (or Victims) | Primarily Western targets, including U.S. entities; Matveev described as feeling secure within Russia, indicating non-targeting of Russian/CIS entities. |
Methodology | Development and distribution of ransomware malware. |
Product Targeted | Ransomware tools and malware development. |
Malware Reference | No specific malware names referenced, but involvement in multiple ransomware campaigns (e.g., REvil) indicated. |
Tools Used | Ransomware development tools (not specified in detail). |
Vulnerabilities Exploited | N/A (No specific vulnerabilities mentioned). |
TTPs | Ransomware distribution, evasion of law enforcement through location (Russia). |
Attribution | Attributed to Matveev, involved with ransomware groups, such as REvil. |
Recommendations | N/A (General focus on the individual’s arrest). |
Source | DataBreaches.Net |
Read full article:https://databreaches.net/2024/11/29/russia-arrests-cybercriminal-wazawaka-for-ties-with-ransomware-gangs/
Disclaimer: The above summary has been generated by an AI language model
Leave a Reply