Article Details
Scrape Timestamp (UTC): 2025-12-13 15:16:45.850
Original Article Text
Click to Toggle View
CyberVolk’s ransomware debut stumbles on cryptography weakness. The pro-Russia hacktivist group CyberVolk launched a ransomware-as-a-service (RaaS) called VolkLocker that suffered from serious implementation flaws, allowing victims to potentially decrypt files for free. According to SentinelOne researchers who examined the new ransomware family, the encryptor uses a hardcoded master key in the binary, which is also written in plaintext in a hidden file on affected machines. This allows targeted companies to use the key to decrypt files for free, undermining VolkLocker's potential in the cybercrime space. Hacktivism and cybercrime CyberVolk is reportedly an India-based pro-Russia hacktivist collective that started operations last year, launching distributed denial of service and ransomware attacks against public and government entities opposing Russia or siding with Ukraine. While the group was disrupted on Telegram, it returned in August 2025 with a new RaaS program, VolkLocker (CyberVolk 2.x), which targets both Linux/VMware ESXi and Windows systems. An interesting feature of VolkLocker is the use of a Golang timer function in its code, which, when it expires or when an incorrect key is entered in the HTML ransomware note, triggers the wiping of user folders (Documents, Downloads, Pictures, and Desktop). Access to the RaaS costs between $800 and $1,100 for a single OS architecture, or $1,600 to $2,200 for both. Purchasers can access a builder bot on Telegram to customize the encryptor and receive the generated payload. In November 2025, the same threat group began advertising a remote access trojan and a keylogger, both priced at $500 each. Critical crypto weakness VolkLocker uses AES-256 in GCM (Galois/Counter Mode) encryption, with a 32-bit master key derived from a 64-character hex string embedded in the binary. A random 12-byte nonce is used as the initialization vector (IV) for each file, deleting the original file and appending the .locked or .cvolk file extension to the encrypted copy. The problem is that VolkLocker uses the same master key to encrypt all files on a victim system, and that same key is also written to a plaintext file (system_backup.key) in the %TEMP% folder. "Since the ransomware never deletes this backup key file, victims could attempt file recovery by extracting the necessary values from the file," explains SentinelOne. "The plaintext key backup likely represents a test artifact inadvertently shipped in production builds." While this flaw may help any existing victims, the disclosure of VolkLocker's cryptographic flaw will likely prompt threat actors to fix the bug and prevent it from being abused in the future. It is considered a better practice not to disclose ransomware flaws while a threat actor is actively running the operation, and instead to share them privately with law enforcement and ransomware negotiation firms that can privately assist victims. BleepingComputer has contacted SentinelOne to ask about its decision to publicly disclose VolkLocker's weakness, and a spokesperson sent the below explanation: "The reason we didn’t hesitate is that this isn’t a core encryption flaw but rather a testing artifact that’s inadvertently getting shipped to some production builds by incompetent operators and isn’t a reliable decryption mechanism beyond those cases. It’s more representative of the ecosystem that CyberVolk is trying to enable through this RaaS offering." - SentinelOne spokesperson Break down IAM silos like Bitpanda, KnowBe4, and PathAI Broken IAM isn't just an IT problem - the impact ripples across your whole business. This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.
Daily Brief Summary
CyberVolk, a pro-Russia hacktivist group, launched VolkLocker, a ransomware-as-a-service targeting Linux/VMware ESXi and Windows systems, but faced setbacks due to cryptographic flaws.
SentinelOne researchers identified a critical implementation flaw in VolkLocker, allowing victims to decrypt files for free using a hardcoded master key found in plaintext on affected machines.
The ransomware uses AES-256 encryption with a 32-bit master key, which is improperly managed, as the key is stored in a plaintext file, undermining its security.
CyberVolk's operations include DDoS and ransomware attacks against entities opposing Russia, with the group resurfacing in August 2025 after previous disruptions.
Despite the cryptographic weakness, the group continues to market additional malware, including a remote access trojan and keylogger, each priced at $500.
The public disclosure of VolkLocker's flaw might prompt threat actors to rectify the issue, though it provides temporary relief to current victims.
SentinelOne's decision to disclose the flaw publicly was based on its nature as a testing artifact, not a core encryption vulnerability, highlighting operational incompetence.