Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption

VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption

Posted on December 15, 2025December 15, 2025 By CWS

Dec 15, 2025Ravie LakshmananRansomware / Cybercrime
The professional-Russian hacktivist group generally known as CyberVolk (aka GLORIAMIST) has resurfaced with a brand new ransomware-as-a-service (RaaS) providing known as VolkLocker that suffers from implementation lapses in check artifacts, permitting customers to decrypt information with out paying an extortion payment.
In keeping with SentinelOne, VolkLocker (aka CyberVolk 2.x) emerged in August 2025 and is able to concentrating on each Home windows and Linux programs. It is written in Golang.
“Operators constructing new VolkLocker payloads should present a bitcoin handle, Telegram bot token ID, Telegram chat ID, encryption deadline, desired file extension, and self-destruct choices,” safety researcher Jim Walter mentioned in a report printed final week.

As soon as launched, the ransomware makes an attempt to escalate privileges, performs reconnaissance and system enumeration, together with checking native MAC handle prefixes in opposition to identified virtualization distributors like Oracle and VMware. Within the subsequent stage, it lists all obtainable drives and determines the information to be encrypted based mostly on the embedded configuration.
VolkLocker makes use of AES-256 in Galois/Counter Mode (GCM) for encryption by way of Golang’s “crypto/rand” package deal. Each encrypted file is assigned a customized extension comparable to .locked or .cvolk.
Nonetheless, an evaluation of the check samples has uncovered a deadly flaw the place the locker’s grasp keys are usually not solely hard-coded within the binaries, however are additionally used to encrypt all information on a sufferer system. Extra importantly, the grasp key can also be written to a plaintext file within the %TEMP% folder (“C:UsersAppDataLocalTempsystem_backup.key”).

Since this backup key file isn’t deleted, the design blunder allows self-recovery. That mentioned, VolkLocker has all of the hallmarks usually related to a ransomware pressure. It makes Home windows Registry modifications to thwart restoration and evaluation, deletes quantity shadow copies, and terminates processes related to Microsoft Defender Antivirus and different frequent evaluation instruments.
Nonetheless, the place it stands out is in the usage of an enforcement timer, which wipes the content material of person folders, viz. Paperwork, Desktop, Downloads, and Photos, if victims fail to pay inside 48 hours or enter the mistaken decryption key thrice.
CyberVolk’s RaaS operations are managed by way of Telegram, costing potential clients between $800 and $1,100 for both a Home windows or Linux model, or between $1,600 and $2,200 for each working programs. VolkLocker payloads include built-in Telegram automation for command-and-control, permitting customers to message victims, provoke file decryption, listing lively victims, and get system data.

As of November 2025, the risk actors have marketed a distant entry trojan and keylogger, each priced at $500 every, indicating a broadening of their monetization technique.
CyberVolk launched its personal RaaS in June 2024. Recognized for conducting distributed denial-of-service (DDoS) and ransomware assaults on public and authorities entities to assist Russian authorities pursuits, it is believed to be of Indian origin.
“Regardless of repeated Telegram account bans and channel removals all through 2025, CyberVolk has reestablished its operations and expanded its service choices,” Walter mentioned. “Defenders ought to see CyberVolk’s adoption of Telegram-based automation as a mirrored image of broader traits amongst politically-motivated risk actors. These teams proceed to decrease obstacles for ransomware deployment whereas working on platforms that present handy infrastructure for legal providers.”

The Hacker News Tags:Allowing, Decryption, Exposed, Free, Hardcoded, Key, Master, Ransomware, VolkLocker

Post navigation

Previous Post: CISA Releases Guidance for Managing UEFI Secure Boot on Enterprise Devices
Next Post: CISA Adds Sierra Router Vulnerability to KEV Catalogue Following Active Exploitation

Related Posts

Google Ordered to Pay 4M for Misusing Android Users’ Cellular Data Without Permission Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission The Hacker News
Meta Disrupts Influence Ops Targeting Romania, Azerbaijan, and Taiwan with Fake Personas Meta Disrupts Influence Ops Targeting Romania, Azerbaijan, and Taiwan with Fake Personas The Hacker News
Critical NVIDIA Container Toolkit Flaw Allows Privilege Escalation on AI Cloud Services Critical NVIDIA Container Toolkit Flaw Allows Privilege Escalation on AI Cloud Services The Hacker News
Bearlyfy Group Intensifies Cyber Attacks on Russian Firms Bearlyfy Group Intensifies Cyber Attacks on Russian Firms The Hacker News
North Korean Cyber Group Targets Crypto Firm in Major Breach North Korean Cyber Group Targets Crypto Firm in Major Breach The Hacker News
Iraqi Officials Targeted by New Malware Campaign Iraqi Officials Targeted by New Malware Campaign The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark