Yanluowang ransomware access broker gets 81 months in prison
Recorded: March 24, 2026, 4 p.m.
| Original | Summarized |
Yanluowang ransomware access broker gets 81 months in prison News Featured TeamPCP deploys Iran-targeted wiper in Kubernetes attacks Microsoft Azure Monitor alerts abused for callback phishing attacks Crunchyroll probes breach after hacker claims to steal 6.8M users' data Microsoft Exchange Online service change causes email access issues Microsoft fixes bug causing Classic Outlook sync issues with Gmail Zero Trust: Bridging the Gap Between Authentication and Trust HackerOne discloses employee data breach after Navia hack Infinite Campus warns of breach after ShinyHunters claims data theft Tutorials Latest How to access the Dark Web using the Tor Browser How to enable Kernel-mode Hardware-enforced Stack Protection in Windows 11 How to use the Windows Registry Editor How to backup and restore the Windows Registry How to start Windows in Safe Mode How to remove a Trojan, Virus, Worm, or other Malware How to show hidden files in Windows 7 How to see hidden files in Windows Webinars Latest Qualys BrowserCheck STOPDecrypter AuroraDecrypter FilesLockerDecrypter AdwCleaner ComboFix RKill Junkware Removal Tool Deals Categories eLearning IT Certification Courses Gear + Gadgets Security VPNs Popular Best VPNs How to change IP address Access the dark web safely Best VPN for YouTube Forums Virus Removal Guides HomeNewsSecurityYanluowang ransomware access broker gets 81 months in prison Yanluowang ransomware access broker gets 81 months in prison By Sergiu Gatlan March 24, 2026 A Russian national was sentenced to nearly 7 years in prison after pleading guilty to acting as an initial access broker (IAB) for Yanluowang ransomware attacks. Red Report 2026: Why Ransomware Encryption Dropped 38% Related Articles: Hacker Sergiu Gatlan Previous Article Post a Comment Community Rules You need to login in order to post a comment Not a member yet? Register Now You may also like: Popular Stories Microsoft Azure Monitor alerts abused for callback phishing attacks Trivy vulnerability scanner breach pushed infostealer via GitHub Actions VoidStealer malware steals Chrome master key via debugger trick Sponsor Posts Overdue a password health-check? Audit your Active Directory for free Overdue a password health-check? Audit your Active Directory for free AI is a data-breach time bomb: Read the new report Cyber resilience without the complexity. Join Zero Networks to stop lateral movement fast. Are refund fraud methods targeting your brand? You can monitor the underground for these threats. Follow us: Main Sections News Community Forums Useful Resources Welcome Guide Company About BleepingComputer Terms of Use - Privacy Policy - Ethics Statement - Affiliate Disclosure Copyright @ 2003 - 2026 Bleeping Computer® LLC - All Rights Reserved Login Username Password Remember Me Sign in anonymously Sign in with Twitter Not a member yet? Register Now Help us understand the problem. What is going on with this comment? Spam Abusive or Harmful Inappropriate content Strong language Other Read our posting guidelinese to learn what content is prohibited. Submitting... |
A 26-year-old Russian national, Aleksey Olegovich Volkov, also known as “chubaka.kor” and “nets,” received a sentence of 81 months in prison following a guilty plea related to his role as an initial access broker (IAB) for the Yanluowang ransomware operation. Volkov’s activities spanned from July 2021 to November 2022, during which he targeted at least eight companies within the United States. His operation involved breaching corporate networks and subsequently selling access to the Yanluowang RaaS group, which then executed ransomware attacks and demanded substantial ransom payments, ranging from $300,000 to $15 million. The Justice Department’s investigation, spearheaded by the FBI, revealed a complex operation. The investigation uncovered evidence of Volkov’s direct involvement in compromising victim networks, stealing data, deploying ransomware, and negotiating ransom payments with affiliates. Specifically, he secured a percentage of the collected ransoms, amounting to $1.5 million. Investigators leveraged recovered digital evidence to trace Volkov's identity, utilizing data from Apple iCloud accounts, cryptocurrency exchange records, and social media activity—including a Twitter account linked to his Russian passport and phone number—to build a comprehensive case. Crucially, the investigation revealed communication between Volkov and what appeared to be the LockBit ransomware gang through chat logs, suggesting a potential collaboration. The FBI’s discovery of chat logs, stolen data, network credentials, and ransom negotiation records, alongside the seizure of a server linked to the Yanluowang group, solidified the prosecution's case. The recovered materials provided a detailed account of the attacks and Volkov’s role within them and helped to identify the methods used by the ransomware gang. Ultimately, Volkov was ordered to pay over $9 million in restitution to the victims, including $9,167,198.19 to known victims, and to forfeit equipment used in his criminal activities. This restitution aims to compensate the victims for their losses resulting from the ransomware attacks. The case highlights the increasingly sophisticated nature of ransomware operations, with IABs playing a critical role in facilitating attacks and disrupting security efforts. The protracted investigation, involving meticulous data analysis and digital forensics, underscored the challenges in combating these cybercrime schemes and effectively bringing perpetrators to justice. |