Ransomware - CyberVolk

CyberVolk (Active)
Aliases
Binary Ghosts
Cyb3r Bytes
CyberBytes
GLORIAMIST
GLORIAMIST India
Solntsevskaya Bratva
Description

CyberVolk is a self-proclaimed hacktivist group with various allegiances to other hacktivist groups throughout the globe, including Anonymous (their subsidiaries), White_Hunters, Cyber Hunters, and others. They even state they work with a DDoS service called SRV to carry out many of their extortion attacks. The group's members (many of which are listed below) carry out data breaches, website defacing, DDoS attacks, and, of course, ransomware. Before they employed ransomware in their arsenal, they were known by various names such as GLORIAMIST and Solntsevskaya Bratva, which dates back to late 2023. However, after a vote, they began to go by CyberVolk (Volk is wolf in Russian). Because they use Russian naming convention, and many of their ransom notes claim they are Russian, research from SentinelOne claims they originate in India and have Pro-Russian allegiances. This is supported by the GLORIAMIST India Alias name they used in the past. However, a researcher in one of the references below claims that the group is French based on the Cyb3r Bytes name, but there's no further evidence to corroborate that.

Much of the information in this entry comes from SentinelOne's research, Detect FYI's publication, Gohan Adiputra's research on Scribd, ThreatMon's report, and Machina Record's report. WatchGuard performed additional analysis to gather further technical information and communication mediums. SentinelOne's research highlighted the ransomware encryptor's lineage to be from AzzaSec group's ransomware that comes from Babuk's leaked encryptor. AzzaSec, and their derivatives (CyberVolk, DeepX, Dxx and Alien, HexaLocker, Invisible, etc.) use a hybrid encryption scheme that uses AES+SHA-512 to encrypt files and RSA-4096 to encrypt the AES symmetric key. Additionally, when executing the ransomware, it changes the desktop wallpaper, invokes an un-closable modal, and appends a file extension of .cvenc, .petik, or .CyberVolk to encrypted files. The modal allows victims to enter a decryption key to encrypt files, but if they enter any combination of 36 alphanumeric characters, the process stops. Some samples performed no encryption. Thus, the group's encryption mechanism has a flaw of some sort.

Throughout 2024, the group targeted mostly organizations from Japan, and a few others from the U.S., Armenia, Venezuela, Albania, and Italy. Their extortion amounts ranged from a few thousand to several million, and their amounts didn't seem to be consistent based on the victims involved. It's difficult to tell if some of these victims had ransomware deployed in their environments or if the group simply exfiltrated data, which is becoming increasingly more common in 2024/2025; hence, the data broker denotation in conjunction with crypto-ransomware and RaaS declarations.

Ransomware Type
Crypto-Ransomware
Data Broker
RaaS
Country of Origin
India
First Seen
Lineage
Threat Actors
Tipo
Actor
Hacktivist
CyberVolk
Individual
DeathHack
Individual
ghostdoor_maldev
Individual
hacker7
Individual
hackerk7
Individual
moonnight_god
Individual
xpolarized
Extortion Types
Direct Extortion
DoS
Extortion Timeout
Free Data Leaks
Website Defacing
Amount
$500
$1,000
$2,000
$10,000
$20,000
$70,000
$2,000,000
$2,500,000
$5,000,000
$8,000,000
Medio
Identificativo
Telegram
Telegram
Telegram
Telegram
Telegram
Telegram
Telegram
Telegram
Telegram
Telegram
Telegram
Encryption
Type
Hybrid
Files
AES
Key
RSA-4096
Additional Encryption
SHA-512
Crypto Wallets
Blockchain Type
Crypto Wallet
BTC
bc1q3c9pt084cafxfvyhn8wvh7mq04rq6naew0mk87
USDT
TXarMAbSLLmStn4RZj63cTH7tpbodGNGbZ
File Extension
<file name>.<file extension>.cvenc
<file name>.<file extension>.CyberVolk
<file name>.<file extension>.petik
Ransom Note Name
CyberVolk_ReadMe.txt
tmp.bmp
wallpaper.bmp
102276ae1f518745695fe8f291bf6e69856b91723244881561bb1a2338d54b12
3c47b052e78c15a003b18af61fe09225d1239000634747770be77518fdf02a19
489e921e3f060b15e3825ca53205eddecbe65583b3de90bb3550049d2c278de8
6343bb6570bdea7f0e829312cf5829defa9eb69238fefa6c272650e1e5219a86
9e613ef9338ff03c8fb9910a14a09e3fb3af6b105257a51e257f3e964347711e
a834b3d15719bbf9f0c7b5740b8a30de2eb3aee9e24598b3a30e37253e0c154e
d069ad1b5c46ecb0b6206a261cf89656e47a0add9e1f34a00701960559465fca
d1f61189d444ca4f3fb461d00c8e5289037451ce244b934ff9f81618ef452f72
de0b74917fe24c2b38e2d1172b7352f88bf8b3df64b6d44ca5f317db85aeb324
ed6c889c833ba5a210bd5c535564ef185b014a34397bbb8b91c7be890f16fe88
Industry Sector Paese Extortion Date Amount (USD)
Environmental Services United States $5,000,000
Environmental Services United States $2,000,000
Environmental Services Japan $70,000
Automotive Japan
Government Armenia $2,500,000
Energy Japan
Scientific Services Japan
Scientific Services Japan $10,000
Telecommunications Japan $20,000
Scientific Services Japan $10,000
Environmental Services Japan $20,000
Environmental Services Japan $10,000
Education Japan $2,000
Oil & Gas Venezuela
Government Italy
Government Venezuela
Government Albania