Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Yanluowang Broker Pleads Guilty

November 11, 2025
Reading Time: 3 mins read
in News
Yanluowang Broker Pleads Guilty

A Russian national, Aleksey Olegovich Volkov, who operated under the aliases “chubaka.kor” and “nets,” has signed a plea agreement admitting to his role as an initial access broker (IAB) for the Yanluowang ransomware organization. Volkov’s method involved illegally breaching the networks of corporate entities and then selling this unauthorized access to the ransomware group. This access allowed the group to deploy their ransomware, encrypt the victims’ crucial data, and subsequently issue ransom demands ranging from $300,000 to $15 million, to be paid in Bitcoin. Volkov is linked to network intrusions affecting at least eight U.S. companies across several states, including firms in Pennsylvania, California, Michigan, Illinois, Georgia, and Ohio.

FBI investigators successfully obtained search warrants for a server tied to Volkov’s operation, which yielded substantial evidence. This included chat logs detailing the criminal enterprise, credentials for victim networks, and the actual stolen data. Furthermore, evidence was recovered concerning the Yanluowang email accounts used by the group for ransom negotiations. The investigators successfully established Volkov’s identity by tracing his phone number and Russian passport through various digital means. These included Apple iCloud data linked to the account alekseyvolkov4574@icloud[.]com, records from cryptocurrency exchanges, and various social media accounts, such as a Twitter profile linked to the email qwerty4574@mail[.]ru.

The recovered chat logs were pivotal, providing clear documentation of Volkov’s coordination with a co-conspirator known as “CC-1.” The discussions revealed an agreement where Volkov would supply network credentials to CC-1 in exchange for a percentage of the resulting ransom payments. Following these successful attacks, Volkov did, in fact, collect a portion of the ransom money. Blockchain analysis confirmed this, tracing parts of the total $1.5 million in paid ransoms—including payments of $94,259 and $162,220 from two separate Yanluowang incidents—directly to Bitcoin addresses that Volkov had provided to CC-1 during their encrypted exchanges.

During their review of documents from Volkov’s Apple account, investigators uncovered additional, critical information. They found a screenshot of a chat between the defendant and a user identified as “LockBit.” This finding, documented in an affidavit signed by FBI Special Agent Jeffrey Hunter, suggests a potential relationship or link between Volkov and the extremely well-known and dangerous LockBit ransomware gang, indicating his involvement may have extended beyond the Yanluowang operation. Volkov was arrested in Italy in January 2024 and subsequently extradited to the United States to face justice.

Volkov is now confronting a substantial maximum sentence of 53 years in federal prison. The charges he faces are numerous and serious, including conspiracy to commit computer fraud, conspiracy to commit money laundering, unlawful transfer of a means of identification, access device fraud, trafficking in access information, and aggravated identity theft. As part of his plea agreement, he is also mandated to pay a massive sum of $9,167,198.19 in restitution to the individuals and companies victimized by the Yanluowang attacks he facilitated. The Yanluowang operation itself, which first emerged in October 2021, is known for its highly targeted global attacks.

Reference:

  • Yanluowang Initial Access Broker Pleads Guilty To Role In Ransomware Attacks
Tags: Cyber NewsCyber News 2025Cyber threatsNovember 2025
ADVERTISEMENT

Related Posts

Yanluowang Broker Pleads Guilty

Australia Sanctions North Korea Hackers

November 11, 2025
Yanluowang Broker Pleads Guilty

Forbes AI 50 Firms Leak Secrets

November 11, 2025
Google Maps Adds Extortion Reporting

Cybersecurity Talent Gap Hits 50 Percent

November 10, 2025
Google Maps Adds Extortion Reporting

FBI Demands Data From Tucows

November 10, 2025
Google Maps Adds Extortion Reporting

Google Maps Adds Extortion Reporting

November 10, 2025

Google Warns AI Will Boost Cybercrime

November 7, 2025

Latest Alerts

Glassworm Found In Three VS Code Addons

Triofox Flaw Lets Hackers Install Remote

Delayed Payloads Hit Nuget Packages

Samsung Flaw Used To Install Landfall

ClickFix Phishing Targets Hotel Systems

Lost iPhone Beware Fake Text Claims

Subscribe to our newsletter

    Latest Incidents

    Italian Adviser Targeted By Paragon Spyware

    Manassas Schools Close After Cyberattack

    Chinese Breach Exposes Cyber Weapons

    Oracle EBS Hack Hits Nearly 30 Victims

    China Hackers Target US Nonprofit

    Hackers Steal Sonicwall Cloud Backups

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial