VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内,并且不需要特定的开头。首先,我得仔细阅读文章内容,抓住主要信息。 文章讲的是一个支持俄罗斯的黑客组织CyberVolk推出了新的RaaS服务VolkLocker。这个勒索软件针对Windows和Linux系统,用Golang编写。它的加密方式存在漏洞,主密钥被硬编码在二进制文件中,并且存储在临时文件夹里,导致用户可以自行解密而无需支付赎金。 此外,VolkLocker还有一些特别的功能,比如使用计时器,在48小时内未支付赎金或输入错误密钥三次后删除用户文件。该组织通过Telegram管理其RaaS服务,价格在800到2200美元之间。他们还扩展了服务范围,增加了远程访问木马和键盘记录器。 总结时,我需要涵盖这些关键点:组织名称、产品名称、漏洞、功能特点、管理方式及扩展服务。同时要确保语言简洁明了,不超过100字。 可能的结构是:开头提到组织和产品,接着说明漏洞和加密问题,然后提到计时器功能和管理方式,最后提到扩展的服务。 现在把这些点浓缩成一句话:支持俄罗斯的黑客组织CyberVolk推出新的勒索软件VolkLocker(基于Golang),存在主密钥硬编码漏洞可被解密;采用Telegram自动化管理,并扩展了远程访问木马和键盘记录器服务。 这样既涵盖了主要信息又符合字数要求。 </think> 支持俄罗斯的黑客组织CyberVolk推出新的勒索软件VolkLocker(基于Golang),存在主密钥硬编码漏洞可被解密;采用Telegram自动化管理,并扩展了远程访问木马和键盘记录器服务。 2025-12-15 05:33:0 Author: thehackernews.com(查看原文) 阅读量:5 收藏

The pro-Russian hacktivist group known as CyberVolk (aka GLORIAMIST) has resurfaced with a new ransomware-as-a-service (RaaS) offering called VolkLocker that suffers from implementation lapses in test artifacts, allowing users to decrypt files without paying an extortion fee.

According to SentinelOne, VolkLocker (aka CyberVolk 2.x) emerged in August 2025 and is capable of targeting both Windows and Linux systems. It's written in Golang.

"Operators building new VolkLocker payloads must provide a bitcoin address, Telegram bot token ID, Telegram chat ID, encryption deadline, desired file extension, and self-destruct options," security researcher Jim Walter said in a report published last week.

Cybersecurity

Once launched, the ransomware attempts to escalate privileges, performs reconnaissance and system enumeration, including checking local MAC address prefixes against known virtualization vendors like Oracle and VMware. In the next stage, it lists all available drives and determines the files to be encrypted based on the embedded configuration.

VolkLocker uses AES-256 in Galois/Counter Mode (GCM) for encryption through Golang's "crypto/rand" package. Every encrypted file is assigned a custom extension such as .locked or .cvolk.

However, an analysis of the test samples has uncovered a fatal flaw where the locker's master keys are not only hard-coded in the binaries, but are also used to encrypt all files on a victim system. More importantly, the master key is also written to a plaintext file in the %TEMP% folder ("C:\Users\AppData\Local\Temp\system_backup.key").

Since this backup key file is never deleted, the design blunder enables self-recovery. That said, VolkLocker has all the hallmarks typically associated with a ransomware strain. It makes Windows Registry modifications to thwart recovery and analysis, deletes volume shadow copies, and terminates processes associated with Microsoft Defender Antivirus and other common analysis tools.

However, where it stands out is in the use of an enforcement timer, which wipes the content of user folders, viz. Documents, Desktop, Downloads, and Pictures, if victims fail to pay within 48 hours or enter the wrong decryption key three times.

CyberVolk's RaaS operations are managed through Telegram, costing prospective customers between $800 and $1,100 for either a Windows or Linux version, or between $1,600 and $2,200 for both operating systems. VolkLocker payloads come with built-in Telegram automation for command-and-control, allowing users to message victims, initiate file decryption, list active victims, and get system information.

Cybersecurity

As of November 2025, the threat actors have advertised a remote access trojan and keylogger, both priced at $500 each, indicating a broadening of their monetization strategy.

CyberVolk launched its own RaaS in June 2024. Known for conducting distributed denial-of-service (DDoS) and ransomware attacks on public and government entities to support Russian government interests, it's believed to be of Indian origin.

"Despite repeated Telegram account bans and channel removals throughout 2025, CyberVolk has reestablished its operations and expanded its service offerings," Walter said. "Defenders should see CyberVolk's adoption of Telegram-based automation as a reflection of broader trends among politically-motivated threat actors. These groups continue to lower barriers for ransomware deployment while operating on platforms that provide convenient infrastructure for criminal services."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2025/12/volklocker-ransomware-exposed-by-hard.html
如有侵权请联系:admin#unsafe.sh