Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CyberVolk Hackers Group With New VolkLocker Payloads Attacks both Linux and Windows Systems

Posted on December 12, 2025December 12, 2025 By CWS

CyberVolk, a pro-Russia hacktivist group, has reemerged with a brand new ransomware platform known as VolkLocker following a interval of dormancy in 2025.

The group, first documented in late 2024 for conducting assaults aligned with Russian authorities pursuits, initially went silent because of Telegram enforcement actions.

Nonetheless, the group returned in August with a complicated Ransomware-as-a-Service providing that mixes harmful encryption options with Telegram-based automation instruments.

The VolkLocker platform represents the group’s evolution in assault capabilities, introducing each superior automation and troubling weaknesses.

The ransomware targets a number of working programs, with variations written in Golang to assist each Linux and Home windows environments.

This cross-platform method considerably expands the group’s assault floor and permits them to compromise various organizational infrastructure.

The bottom builds arrive with out obfuscation, and operators are inspired to make use of UPX packing for extra safety reasonably than native crypting options generally present in competing ransomware-as-a-service choices.

SentinelOne safety analysts famous that VolkLocker payloads reveal the group’s fast enlargement whereas concurrently exposing operational immaturities that depart victims with potential restoration alternatives.

Decryption triggered by way of backed-up key file (Supply – SentinelOne)

The evaluation identifies crucial check artifacts embedded throughout the malware code, suggesting rushed growth and incomplete safety protocols within the ransomware’s creation course of.

Understanding the Privilege Escalation Mechanism

The malware employs refined privilege escalation ways instantly upon execution. When launched, VolkLocker examines its execution surroundings and makes an attempt to realize administrative entry when vital.

The first escalation approach leverages the “ms-settings” Consumer Account Management bypass, which manipulates the registry key HKCUSoftwareClassesms-settingsshellopencommand to execute with elevated privileges.

CyberVolk (2025) Ransom word HTML (Supply – SentinelOne)

This technique hijacks legit Home windows settings performance to bypass safety controls with out triggering person warnings.

The privilege escalation course of begins by opening the goal registry key with applicable permissions.

The malware then units string values that redirect the legit ms-settings executable to run the ransomware payload with administrator rights.

As soon as elevated privileges are obtained, the malware can entry protected information and system directories throughout all the community.

Moreover, VolkLocker performs complete environmental discovery, together with course of enumeration to detect digital machines by figuring out frequent virtualization instruments like VirtualBox, VMware, and QEMU brokers.

The malware cross-references working processes towards identified digital surroundings service names and checks MAC addresses towards vendor prefixes to keep away from execution in sandbox environments.

This detection evasion technique permits the malware to focus on manufacturing programs whereas avoiding safety researcher evaluation in remoted laboratory environments.

Organizations should implement sturdy detection mechanisms, privilege escalation monitoring, and registry entry controls to defend towards VolkLocker’s refined assault chain.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attacks, CyberVolk, Group, Hackers, Linux, Payloads, Systems, VolkLocker, Windows

Post navigation

Previous Post: Recent GeoServer Vulnerability Exploited in Attacks
Next Post: Fieldtex Data Breach Impacts 238,000

Related Posts

Threat Actors Abuse Adtech Companies to Target Users With Malicious Ads Cyber Security News
BlueNoroff Hackers Adopts New Infiltration Strategies To Attack C-Level Executives, and Managers Cyber Security News
SCATTERED SPIDER Using Aggressive Social Engineering Techniques to Deceive IT Support Teams Cyber Security News
Hackers Exploit SimpleHelp RMM Tool to Deploy DragonForce Ransomware Cyber Security News
Elastic Cloud Enterprise Vulnerability Let Attackers Execute Malicious Commands Cyber Security News
Huge Surge in Fake Investment Platforms Mimic Forex Exchanges Steal Logins Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Surge in Attacks Targeting RSC-Enabled Services Worldwide
  • In Other News: PromptPwnd Attack, Small macOS Bounties, Chinese Hackers Trained in Cisco Academy
  • New JSCEAL Infostealer Malware Attacking Windows Systems to Steal Login Credentials
  • New Research Details on What Happens to Data Stolen in a Phishing Attack
  • New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Surge in Attacks Targeting RSC-Enabled Services Worldwide
  • In Other News: PromptPwnd Attack, Small macOS Bounties, Chinese Hackers Trained in Cisco Academy
  • New JSCEAL Infostealer Malware Attacking Windows Systems to Steal Login Credentials
  • New Research Details on What Happens to Data Stolen in a Phishing Attack
  • New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark