Yanluowang initial access broker pleaded guilty to ransomware attacks
一名俄罗斯男子承认作为初始访问代理参与Yanluowang勒索软件攻击,入侵至少八家美国公司并出售网络访问权限。FBI通过服务器、iCloud数据和社交媒体账户追踪到其身份,并查获聊天记录和赎金支付证据。他面临最高53年监禁和超过910万美元的赔偿。 2025-11-10 20:30:23 Author: www.bleepingcomputer.com(查看原文) 阅读量:7 收藏

Hacker

A Russian national will plead guilty to acting as an initial access broker (IAB) for Yanluowang ransomware attacks that targeted at least eight U.S. companies between July 2021 and November 2022.

According to a plea agreement signed by the defendant on October 29, first spotted by Court Watch editor Seamus Hughes, Aleksey Olegovich Volkov (who used the "chubaka.kor" and "nets" aliases) breached corporate networks and sell that access to the ransomware group, which deployed ransomware to encrypt victims' data and sent ransom demands ranging from $300,000 to $15 million paid to be paid Bitcoin.

FBI investigators obtained search warrants for a server linked to the operation, recovering chat logs, stolen data, victim network credentials, as well as evidence of Yanluowang email accounts used for ransom negotiations.

Wiz

They also traced Volkov's identity through Apple iCloud data (linked to an account using the alekseyvolkov4574@icloud[.]com Apple ID), cryptocurrency exchange records, and social media accounts (including a Twitter account associated with the qwerty4574@mail[.]ru email) linked to his phone number and Russian passport.

The recovered chat logs showed Volkov negotiating deals with a co-conspirator known as "CC-1" and agreeing to receive a percentage of the ransom payments in exchange for providing credentials to the victims' networks. Following these attacks, Volkov collected a percentage of the resulting $1.5 million in ransom payments.

While reviewing documents from Volkov's Apple account, investigators also found a screenshot of a chat between the defendant and a user named LockBit, suggesting a potential link to the notorious LockBit ransomware gang, according to an affidavit signed by FBI Special Agent Jeffrey Hunter.

Volkov was linked to network breaches affecting a Philadelphia-based company, an engineering firm with 19 U.S. offices, a California company, a Michigan bank, an Illinois business, a Georgia company, an Ohio telecommunications provider, and a business in the Eastern District of Pennsylvania.

Two of the victims paid a total of $1.5 million in ransoms, with blockchain analysis tracing portions of these payments to Bitcoin addresses Volkov provided to CC-1 in their chats, including $94,259 and $162,220 from two different Yanluowang attacks.

Volkov is currently facing a maximum sentence of 53 years in prison for several charges, including unlawful transfer of a means of identification, trafficking in access information, access device fraud, aggravated identity theft, conspiracy to commit computer fraud, and conspiracy to commit money laundering. 

He will also be required to pay over $9.1 million ($9,167,198.19) in restitution to the victims of the Yanluowang attacks he was involved in. 

The Yanluowang ransomware operation was first spotted in October 2021 and has been linked to highly targeted attacks against companies worldwide. Volkov was arrested in Italy in January 2024, extradited to the United States that same year, and charged after Yanluowang stole non-sensitive files from a Cisco employee's Box folder in May 2022, but failed to encrypt its systems and collect a ransom.

Wiz

7 Security Best Practices for MCP

As MCP (Model Context Protocol) becomes the standard for connecting LLMs to tools and data, security teams are moving fast to keep these new services safe.

This free cheat sheet outlines 7 best practices you can start using today.


文章来源: https://www.bleepingcomputer.com/news/security/yanluowang-initial-access-broker-pleaded-guilty-to-ransomware-attacks/
如有侵权请联系:admin#unsafe.sh