Yanluowang initial access broker to plead guilty to ransomware attacks
好的,我现在需要帮用户总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我得通读整篇文章,抓住主要信息。 文章讲的是一个俄罗斯人Aleksey Volkov作为初始访问代理(IAB),参与了Yanluowang勒索软件攻击,针对至少八家美国公司。时间范围是从2021年7月到2022年11月。他入侵企业网络,将访问权限卖给勒索团伙,导致数据被加密和赎金要求。FBI通过服务器、iCloud数据、加密货币记录等手段追踪到他,并发现他从赎金中分得150万美元。最终他面临最高53年的监禁和超过910万美元的赔偿。 接下来,我需要把这些关键点浓缩成一段话,不超过100字。重点包括:俄罗斯人、作为IAB、Yanluowang攻击、针对美国公司、入侵网络、提供访问权限、FBI调查、赎金分成、法律后果。 然后组织语言,确保流畅且信息完整。比如:“一名俄罗斯男子承认作为初始访问代理参与Yanluowang勒索软件攻击,针对至少八家美国公司。他入侵企业网络并提供访问权限给勒索团伙,导致数据加密和赎金要求。FBI通过服务器和iCloud数据追踪到他,并发现他从赎金中分得150万美元。他面临最高53年监禁和超过910万美元的赔偿。” 检查字数是否在限制内,并确保没有遗漏重要信息。 </think> 一名俄罗斯男子承认作为初始访问代理参与Yanluowang勒索软件攻击,针对至少八家美国公司。他入侵企业网络并提供访问权限给勒索团伙,导致数据加密和赎金要求。FBI通过服务器和iCloud数据追踪到他,并发现他从赎金中分得150万美元。他面临最高53年监禁和超过910万美元的赔偿。 2025-11-10 19:15:22 Author: www.bleepingcomputer.com(查看原文) 阅读量:8 收藏

Hacker

A Russian national will plead guilty to acting as an initial access broker (IAB) for Yanluowang ransomware attacks that targeted at least eight U.S. companies between July 2021 and November 2022.

According to a plea agreement signed by the defendant on October 29, first spotted by Court Watch editor Seamus Hughes, Aleksey Olegovich Volkov (who used the "chubaka.kor" and "nets" aliases) breached corporate networks and sell that access to the ransomware group, which deployed ransomware to encrypt victims' data and sent ransom demands ranging from $300,000 to $15 million paid to be paid Bitcoin.

FBI investigators obtained search warrants for a server linked to the operation, recovering chat logs, stolen data, victim network credentials, as well as evidence of Yanluowang email accounts used for ransom negotiations.

Wiz

They also traced Volkov's identity through Apple iCloud data (linked to an account using the alekseyvolkov4574@icloud[.]com Apple ID), cryptocurrency exchange records, and social media accounts (including a Twitter account associated with the qwerty4574@mail[.]ru email) linked to his phone number and Russian passport.

The recovered chat logs showed Volkov negotiating deals with a co-conspirator known as "CC-1" and agreeing to receive a percentage of the ransom payments in exchange for providing credentials to the victims' networks. Following these attacks, Volkov collected a percentage of the resulting $1.5 million in ransom payments.

While reviewing documents from Volkov's Apple account, investigators also found a screenshot of a chat between the defendant and a user named LockBit, suggesting a potential link to the notorious LockBit ransomware gang, according to an affidavit signed by FBI Special Agent Jeffrey Hunter.

Volkov was linked to network breaches affecting a Philadelphia-based company, an engineering firm with 19 U.S. offices, a California company, a Michigan bank, an Illinois business, a Georgia company, an Ohio telecommunications provider, and a business in the Eastern District of Pennsylvania.

Two of the victims paid a total of $1.5 million in ransoms, with blockchain analysis tracing portions of these payments to Bitcoin addresses Volkov provided to CC-1 in their chats, including $94,259 and $162,220 from two different Yanluowang attacks.

Volkov is currently facing a maximum sentence of 53 years in prison for several charges, including unlawful transfer of a means of identification, trafficking in access information, access device fraud, aggravated identity theft, conspiracy to commit computer fraud, and conspiracy to commit money laundering. 

He will also be required to pay over $9.1 million ($9,167,198.19) in restitution to the victims of the Yanluowang attacks he was involved in. 

The Yanluowang ransomware operation was first spotted in October 2021 and has been linked to highly targeted attacks against companies worldwide. Volkov was arrested in Italy in January 2024, extradited to the United States that same year, and charged after Yanluowang stole non-sensitive files from a Cisco employee's Box folder in May 2022, but failed to encrypt its systems and collect a ransom.

Wiz

Secrets Security Cheat Sheet: From Sprawl to Control

Whether you're cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start.

Get the cheat sheet and take the guesswork out of secrets management.


文章来源: https://www.bleepingcomputer.com/news/security/yanluowang-initial-access-broker-to-plead-guilty-to-ransomware-attacks/
如有侵权请联系:admin#unsafe.sh