Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CyberVolk Hackers Group With New VolkLocker Payloads Attacks both Linux and Windows Systems

CyberVolk Hackers Group With New VolkLocker Payloads Attacks both Linux and Windows Systems

Posted on December 12, 2025December 12, 2025 By CWS

CyberVolk, a pro-Russia hacktivist group, has reemerged with a brand new ransomware platform known as VolkLocker following a interval of dormancy in 2025.

The group, first documented in late 2024 for conducting assaults aligned with Russian authorities pursuits, initially went silent because of Telegram enforcement actions.

Nonetheless, the group returned in August with a complicated Ransomware-as-a-Service providing that mixes harmful encryption options with Telegram-based automation instruments.

The VolkLocker platform represents the group’s evolution in assault capabilities, introducing each superior automation and troubling weaknesses.

The ransomware targets a number of working programs, with variations written in Golang to assist each Linux and Home windows environments.

This cross-platform method considerably expands the group’s assault floor and permits them to compromise various organizational infrastructure.

The bottom builds arrive with out obfuscation, and operators are inspired to make use of UPX packing for extra safety reasonably than native crypting options generally present in competing ransomware-as-a-service choices.

SentinelOne safety analysts famous that VolkLocker payloads reveal the group’s fast enlargement whereas concurrently exposing operational immaturities that depart victims with potential restoration alternatives.

Decryption triggered by way of backed-up key file (Supply – SentinelOne)

The evaluation identifies crucial check artifacts embedded throughout the malware code, suggesting rushed growth and incomplete safety protocols within the ransomware’s creation course of.

Understanding the Privilege Escalation Mechanism

The malware employs refined privilege escalation ways instantly upon execution. When launched, VolkLocker examines its execution surroundings and makes an attempt to realize administrative entry when vital.

The first escalation approach leverages the “ms-settings” Consumer Account Management bypass, which manipulates the registry key HKCUSoftwareClassesms-settingsshellopencommand to execute with elevated privileges.

CyberVolk (2025) Ransom word HTML (Supply – SentinelOne)

This technique hijacks legit Home windows settings performance to bypass safety controls with out triggering person warnings.

The privilege escalation course of begins by opening the goal registry key with applicable permissions.

The malware then units string values that redirect the legit ms-settings executable to run the ransomware payload with administrator rights.

As soon as elevated privileges are obtained, the malware can entry protected information and system directories throughout all the community.

Moreover, VolkLocker performs complete environmental discovery, together with course of enumeration to detect digital machines by figuring out frequent virtualization instruments like VirtualBox, VMware, and QEMU brokers.

The malware cross-references working processes towards identified digital surroundings service names and checks MAC addresses towards vendor prefixes to keep away from execution in sandbox environments.

This detection evasion technique permits the malware to focus on manufacturing programs whereas avoiding safety researcher evaluation in remoted laboratory environments.

Organizations should implement sturdy detection mechanisms, privilege escalation monitoring, and registry entry controls to defend towards VolkLocker’s refined assault chain.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attacks, CyberVolk, Group, Hackers, Linux, Payloads, Systems, VolkLocker, Windows

Post navigation

Previous Post: Recent GeoServer Vulnerability Exploited in Attacks
Next Post: Fieldtex Data Breach Impacts 238,000

Related Posts

New MacSync Stealer Malware Attacking macOS Users Using Digitally Signed Apps New MacSync Stealer Malware Attacking macOS Users Using Digitally Signed Apps Cyber Security News
MetaMask Phishing Scam Uses Fake Security Reports MetaMask Phishing Scam Uses Fake Security Reports Cyber Security News
Scanner Tool to Detect WhisperPair Flaw in Google’s Fast Pair Protocol Scanner Tool to Detect WhisperPair Flaw in Google’s Fast Pair Protocol Cyber Security News
Hackers Attacking Apache Tomcat Manager From 400 Unique IPs Hackers Attacking Apache Tomcat Manager From 400 Unique IPs Cyber Security News
ChoiceJacking Attack Lets Hackers Compromise Android & iOS Devices via Malicious Charger ChoiceJacking Attack Lets Hackers Compromise Android & iOS Devices via Malicious Charger Cyber Security News
China-Linked Silver Dragon Uses Google Drive in Cyberattacks China-Linked Silver Dragon Uses Google Drive in Cyberattacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark