In January 2022, KrebsOnSecurity recognized a Russian man named Mikhail Matveev as “Wazawaka,” a cybercriminal who was deeply concerned within the formation and operation of a number of ransomware teams. The U.S. authorities indicted Matveev as a high ransomware purveyor a 12 months later, providing $10 million for data resulting in his arrest. Final week, the Russian authorities reportedly arrested Matveev and charged him with creating malware used to extort corporations.
Matveev, a.okay.a. “Wazawaka” and “Boriselcin” labored with at the very least three completely different ransomware gangs that extorted a whole lot of tens of millions of {dollars} from corporations, faculties, hospitals and authorities companies, U.S. prosecutors allege.
Russia’s inside ministry final week issued a press release saying a 32-year-old hacker had been charged with violating home legal guidelines towards the creation and use of malicious software program. The announcement didn’t identify the accused, however the Russian state information company RIA Novosti cited nameless sources saying the person detained is Matveev.
Matveev didn’t reply to requests for remark. Daryna Antoniuk at TheRecord experiences {that a} safety researcher mentioned on Sunday that they had contacted Wazawaka, who confirmed being charged and mentioned he’d paid two fines, had his cryptocurrency confiscated, and is at the moment out on bail pending trial.
Matveev’s hacker identities have been remarkably open and talkative on quite a few cybercrime boards. Shortly after being recognized as Wazawaka by KrebsOnSecurity in 2022, Matveev printed a number of selfie movies on Twitter/X the place he acknowledged utilizing the Wazawaka moniker and talked about a number of safety researchers by identify (together with this creator). Extra not too long ago, Matveev’s X profile (@ransomboris) posted an image of a t-shirt that options the U.S. authorities’s “Needed” poster for him.
The golden rule of cybercrime in Russia has at all times been that so long as you by no means hack, extort or steal from Russian residents or corporations, you may have little to worry of arrest. Wazawaka claimed he zealously adhered to this rule as a private {and professional} mantra.
“Don’t shit the place you reside, journey native, and don’t go overseas,” Wazawaka wrote in January 2021 on the Russian-language cybercrime discussion board Exploit. “Mom Russia will enable you. Love your nation, and you’ll at all times get away with every part.”
Nonetheless, Wazawaka might not have at all times caught to that rule. At a number of factors all through his profession, Wazawaka claimed he made good cash stealing accounts from drug sellers on darknet narcotics bazaars.
Cyber intelligence agency Intel 471 mentioned Matveev’s arrest raises extra questions than solutions, and that Russia’s motivation right here possible goes past what’s occurring on the floor.
“It’s attainable this can be a shakedown by Kaliningrad authorities of a neighborhood web thug who has tens of tens of millions of {dollars} in cryptocurrency,” Intel 471 wrote in an evaluation printed Dec. 2. “The nation’s ingrained, institutional corruption dictates that if dues aren’t paid, hassle will come knocking. However it’s normally an issue cash can repair.
Intel 471 says whereas Russia’s courtroom system is opaque, Matveev will possible be open in regards to the proceedings, significantly if he pays a toll and is granted passage to proceed his damaging actions.
“Sadly, none of this might mark significant progress towards ransomware,” they concluded.
Though Russia historically hasn’t put loads of effort into going after cybercriminals inside its borders, it has introduced a collection of costs towards alleged ransomware actors this 12 months. In January, 4 males tied to the REvil ransomware group have been sentenced to prolonged jail phrases. The boys have been amongst 14 suspected REvil members rounded up by Russia within the weeks earlier than Russia invaded Ukraine in 2022.
Earlier this 12 months, Russian authorities arrested at the very least two males for allegedly working the short-lived Sugarlocker ransomware program in 2021. Aleksandr Ermakov and Mikhail Shefel (now legally Mikhail Lenin) ran a safety consulting enterprise known as Shtazi-IT. Shortly earlier than his arrest, Ermakov grew to become the primary ever cybercriminal sanctioned by Australia, which alleged he stole and leaked knowledge on practically 10 million prospects of the Australian well being large Medibank.
In December 2023, KrebsOnSecurity recognized Lenin as “Rescator,” the nickname utilized by the cybercriminal chargeable for promoting greater than 100 million fee playing cards stolen from prospects of Goal and Residence Depot in 2013 and 2014. Final month, Shefel admitted in an interview with KrebsOnSecurity that he was Rescator, and claimed his arrest within the Sugarlocker case was payback for reporting the son of his former boss to the police.
Ermakov was sentenced to 2 years probation. However on the identical day my interview with Lenin was printed right here, a Moscow courtroom declared him insane, and ordered him to bear obligatory medical remedy, The Report’s Antoniuk notes.