www.securityweek.com
Open in
urlscan Pro
172.67.97.169
Public Scan
Submitted URL: https://communications.h-isac.org/e/1025843/-his-head-reportedly-arrested-/3fqds/343104419/h/WqLIyqGHP15GQvYmxJxkX31PwBT5g8NWbUXhn...
Effective URL: https://www.securityweek.com/russian-hacker-with-10-million-bounty-on-his-head-reportedly-arrested/
Submission: On December 05 via api from US — Scanned from CA
Effective URL: https://www.securityweek.com/russian-hacker-with-10-million-bounty-on-his-head-reportedly-arrested/
Submission: On December 05 via api from US — Scanned from CA
Form analysis
4 forms found in the DOMGET https://www.securityweek.com/
<form method="get" id="zox-search-form" action="https://www.securityweek.com/">
<input type="text" name="s" id="zox-search-input" value="Search" onfocus="if (!window.__cfRLUnblockHandlers) return false; if (this.value == "Search") { this.value = ""; }"
onblur="if (!window.__cfRLUnblockHandlers) return false; if (this.value == "Search") { this.value = ""; }">
<input type="submit" id="zox-search-submit" value="Search">
</form>
Name: ccoptin — POST https://visitor.constantcontact.com/d.jsp
<form class="sw-newsletter-cc" style="" method="post" target="_blank" action="https://visitor.constantcontact.com/d.jsp" name="ccoptin">
<input type="hidden" value="1102592012458" name="m">
<input type="hidden" value="oi" name="p">
<div class="form-item">
<input type="text" class="form-text required" value="" placeholder="Business Email Address..." size="60" name="ea" maxlength="128">
<input type="submit" class="submit" value="Subscribe" name="go">
</div>
</form>
Name: ccoptin — POST https://visitor.constantcontact.com/d.jsp
<form class="sw-newsletter-cc" style="" method="post" target="_blank" action="https://visitor.constantcontact.com/d.jsp" name="ccoptin">
<input type="hidden" value="1102592012458" name="m">
<input type="hidden" value="oi" name="p">
<div class="form-item">
<input type="text" class="form-text required" value="" placeholder="Business Email Address..." size="60" name="ea" maxlength="128">
<input type="submit" class="submit" value="Subscribe" name="go">
</div>
</form>
Name: ccoptin — POST https://visitor.constantcontact.com/d.jsp
<form class="sw-newsletter-cc" method="post" target="_blank" action="https://visitor.constantcontact.com/d.jsp" name="ccoptin">
<input type="hidden" value="1102592012458" name="m">
<input type="hidden" value="oi" name="p">
<div class="form-item">
<input type="text" name="ea" maxlength="128" placeholder="Business Email Address..." class="form-text required" required="">
<input type="submit" class="submit" value="Subscribe" name="go">
</div>
</form>
Text Content
CONFERENCE Cyber AI & Automation Summit - Watch Sessions SECURITYWEEK NETWORK: * Cybersecurity News * Webcasts * Virtual Events ICS: * ICS Cybersecurity Conference * Malware & Threats * Cyberwarfare * Cybercrime * Data Breaches * Fraud & Identity Theft * Nation-State * Ransomware * Vulnerabilities * Security Operations * Threat Intelligence * Incident Response * Tracking & Law Enforcement * Security Architecture * Application Security * Cloud Security * Endpoint Security * Identity & Access * IoT Security * Mobile & Wireless * Network Security * Risk Management * Cyber Insurance * Data Protection * Privacy & Compliance * Supply Chain Security * CISO Strategy * Cyber Insurance * CISO Conversations * CISO Forum * ICS/OT * Industrial Cybersecurity * ICS Cybersecurity Conference * Funding/M&A * Cybersecurity Funding * M&A Tracker * Cybersecurity News * Webcasts * Virtual Events * ICS Cybersecurity Conference Connect with us * * * Hi, what are you looking for? SECURITYWEEK * Malware & Threats * Cyberwarfare * Cybercrime * Data Breaches * Fraud & Identity Theft * Nation-State * Ransomware * Vulnerabilities * Security Operations * Threat Intelligence * Incident Response * Tracking & Law Enforcement * Security Architecture * Application Security * Cloud Security * Endpoint Security * Identity & Access * IoT Security * Mobile & Wireless * Network Security * Risk Management * Cyber Insurance * Data Protection * Privacy & Compliance * Supply Chain Security * CISO Strategy * Cyber Insurance * CISO Conversations * CISO Forum * ICS/OT * Industrial Cybersecurity * ICS Cybersecurity Conference * Funding/M&A * Cybersecurity Funding * M&A Tracker CYBERCRIME RUSSIAN HACKER WITH $10 MILLION BOUNTY ON HIS HEAD REPORTEDLY ARRESTED Russian authorities have reportedly arrested Mikhail Matveev, who is wanted by the US for ransomware attacks against critical infrastructure. By Eduard Kovacs December 2, 2024 * * Flipboard Reddit Whatsapp Whatsapp Email Russian authorities have reportedly arrested Mikhail Pavlovich Matveev, a 32-year-old man from Russia who is wanted by the United States over his alleged role in ransomware attacks. Russian state-owned news agency RIA Novosti reported last week that local prosecutors had announced charges against a man accused of creating a malicious program, specifically one designed to encrypt the data of commercial organizations. RIA Novosti learned from sources that the suspect is Mikhail Pavlovich Matveev [Russian language article]. Matveev has been known online as Wazawaka, m1x, Boriselcin, and Uhodiransomwar. Cybersecurity blogger Brian Krebs revealed that Wazawaka was Matveev in early 2022, which the man later confirmed to be accurate. The FBI added him to its most wanted list in May 2023. The US Justice Department at the time announced charges against Matveev over his alleged role in LockBit, Hive and Babuk ransomware attacks. He is believed to have been involved in ransomware attacks aimed at thousands of entities in the US and elsewhere, including critical infrastructure organizations such as hospitals, airlines, and government organizations. Also in May 2023, the US Treasury Department announced sanctions against the Russian national and the Department of State announced a bounty of up to $10 million for information leading to Matveev’s arrest. It appears that the Russian government has started cracking down on local cybercriminals. A Russian news agency reported last month that a court had sentenced four members of the REvil ransomware group to prison. Advertisement. Scroll to continue reading. Related: Russian National Arrested, Charged in US Over Role in LockBit Ransomware Attacks Related: US Announces Charges, Sanctions Against Russian Administrator of Carding Website Related: Russian Phobos Ransomware Operator Extradited to US Related: Russia Arrests 96 People Tied to US-Disrupted Cryptocurrency Exchanges Written By Eduard Kovacs Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering. MORE FROM EDUARD KOVACS * Largest German Crime Marketplace Taken Down, Administrator Arrested * Government Guidance on Chinese Telco Hacking Highlights Threat to Cisco Devices * Law Enforcement Read Criminals’ Messages After Hacking Matrix Service * Vendors Unveil New Cloud Security Products, Features at AWS re:Invent 2024 * Cisco Warns of Attacks Exploiting Decade-Old ASA Vulnerability * Cybersecurity M&A Roundup: 49 Deals Announced in November 2024 * T-Mobile Shares More Information on China-Linked Cyberattack * Microsoft Patches Exploited Vulnerability in Partner Network Website LATEST NEWS * Watch Now: Cyber AI & Automation Summit- All Sessions Available On Demand * ‘DroidBot’ Android Trojan Targets Banking, Cryptocurrency Applications * 50 Servers Linked to Cybercrime Marketplace and Phishing Sites Seized by Law Enforcement * Bootloader Vulnerability Impacts Over 100 Cisco Switches * Chemonics International Data Breach Impacts 260,000 Individuals * System Two Security Emerges From Stealth With Detection Engineering Solution * White House Says at Least 8 US Telecom Firms, Dozens of Nations Impacted by China Hacking Campaign * BT Investigating Hack After Ransomware Group Claims Theft of Sensitive Data TRENDING DAILY BRIEFING NEWSLETTER Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. WEBINAR: INSIDE A HACKER’S PLAYBOOK: HOW CYBERCRIMINALS USE DEEPFAKES AND BEC TO STEAL COMPANY FUNDS December 10, 2024 Don’t miss this Live Attack demonstration to learn how hackers operate and gain the knowledge to strengthen your defenses. Register WEBINAR: NAVIGATING YOUR OT CYBERSECURITY JOURNEY: FROM ASSESSMENT TO IMPLEMENTATION December 17, 2024 Join us as we share best practices for uncovering risks and determining next steps when vetting external resources, implementing solutions, and procuring post-installation support. Register PEOPLE ON THE MOVE Shanta Kohli has been named CMO at Sysdig. Cloud security firm Sysdig has appointed Sergej Epp as CISO. F5 has appointed John Maddison as Chief Product Marketing and Technology Alliances Officer. More People On The Move EXPERT INSIGHTS SPOTTING THE CHARLATANS: RED FLAGS FOR ENTERPRISE SECURITY TEAMS Even with careful and deliberate hiring, enterprise security teams will find themselves with a charlatan from time to time. (Joshua Goldfarb) RISING TIDES: WENDY NATHER ON RESILIENCE, LEADERSHIP, AND BUILDING A STRONGER CYBERSECURITY COMMUNITY Industry veteran Wendy Nather discusses cybersecurity leadership and the importance of amplifying others’ efforts for the common good. (Jennifer Leggio) AI – IMPLEMENTING THE RIGHT TECHNOLOGY FOR THE RIGHT USE CASE Just like other technologies that have gone before, such as cloud and cybersecurity automation, right now AI lacks maturity. (Marc Solomon) THE URGENT AND CRITICAL NEED TO PRIORITIZE MOBILE SECURITY Organizations that get serious about mobile risks will reduce business risk and boost trust and confidence in their employees, customers, business partners and investors. (Stu Sjouwerman) WHY CUSTOM IOCS ARE NECESSARY FOR ADVANCED THREAT HUNTING AND DETECTION The ability to internalize and operationalize customized threat intelligence as part of a holistic security system is no longer a luxury; it's a necessity. (Etay Maor) * * Flipboard Reddit Whatsapp Whatsapp Email * * * POPULAR TOPICS * Cybersecurity News * Industrial Cybersecurity SECURITY COMMUNITY * Virtual Cybersecurity Events * Webcast Library * CISO Forum * AI Risk Summit * ICS Cybersecurity Conference * Cybersecurity Newsletters STAY INTOUCH * Cyber Weapon Discussion Group * RSS Feed * Security Intelligence Group * Follow SecurityWeek on LinkedIn ABOUT SECURITYWEEK * Advertising * Event Sponsorships * Writing Opportunities * Feedback/Contact Us NEWS TIPS Got a confidential news tip? We want to hear from you. Submit Tip ADVERTISING Reach a large audience of enterprise cybersecurity professionals Contact Us DAILY BRIEFING NEWSLETTER Subscribe to the SecurityWeek Daily Briefing and get the latest content delivered to your inbox. * Privacy Policy Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved. DAILY BRIEFING NEWSLETTER Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time. Close