Alias Description | Votes |
---|---|
Uhodiransomwar is a possible alias for Mikhail Pavlovich Matveev. Uhodiransomwar, also known as Mikhail Pavlovich Matveev, Wazawaka, m1x, and Boriselcin, is a significant threat actor in the cybersecurity landscape. A Russian national aged 30, Matveev has been implicated in a series of malicious cyber activities since at least 2020. He is alleged to have participa | 4 |
Wazawaka is a possible alias for Mikhail Pavlovich Matveev. Wazawaka, identified by the FBI as Mikhail Matveev, is a significant threat actor in the cybercrime landscape. Known for his affiliations with multiple ransomware groups, including LockBit, throughout 2020 and 2021, he became a central figure in the Babuk ransomware-as-a-service gang. Matveev's oper | 4 |
M1x is a possible alias for Mikhail Pavlovich Matveev. M1x, also known as Wazawaka, Boriselcin, and Uhodiransomwar, is a threat actor identified as Mikhail Pavlovich Matveev. This individual has been allegedly involved in malicious cyber activities since at least 2020. Matveev's primary mode of operation involves the deployment of ransomware, specifical | 3 |
Boriselcin is a possible alias for Mikhail Pavlovich Matveev. Mikhail Pavlovich Matveev, also known as Boriselcin, is a threat actor that has been implicated in significant cybercrime activities. Beginning at least as early as 2020, Matveev has been allegedly involved in deploying three ransomware variants: LockBit, Babuk, and Hive. These attacks targeted vari | 3 |
Alias Description | Association Type | Votes |
---|---|---|
The Lockbit Malware is associated with Mikhail Pavlovich Matveev. LockBit is a malicious software, or malware, known for its damaging and exploitative functions. It infiltrates systems via dubious downloads, emails, or websites, often without the user's knowledge, and can steal personal information, disrupt operations, or hold data hostage for ransom. The LockBit | Unspecified | 4 |
The Babuk Malware is associated with Mikhail Pavlovich Matveev. Babuk is a form of malware, specifically ransomware, that infiltrates computer systems and encrypts files, rendering them inaccessible to the user. It typically infects systems through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can disrupt operatio | Unspecified | 2 |
The Hive Malware is associated with Mikhail Pavlovich Matveev. Hive is a form of malware, specifically ransomware, designed to exploit and damage computer systems. It infiltrates systems through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, Hive can steal personal information, disrupt operations, or hold data hostag | Unspecified | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The Hive Ransomware Threat Actor is associated with Mikhail Pavlovich Matveev. Hive ransomware, a prominent threat actor active in 2022, was known for its widespread malicious activities in numerous countries, including the US. The group's modus operandi involved the use of SharpRhino, which upon execution, established persistence and provided remote access to the attackers, e | Unspecified | 3 |
The Vasiliev Threat Actor is associated with Mikhail Pavlovich Matveev. Mikhail Vasiliev, a dual Russian-Canadian national known by various online aliases such as "Ghostrider," was a key threat actor involved in the global LockBit ransomware campaign. Alongside fellow members like Ruslan Magomedovich Astamirov, and others including Sungatov, Kondratyev, and Mikhail Pavl | Unspecified | 2 |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
CERT-EU | 9 months ago | ||
Securityaffairs | 4 months ago | ||
Securityaffairs | 4 months ago | ||
CERT-EU | 2 years ago | ||
Securityaffairs | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | 2 years ago | ||
Flashpoint | 2 years ago | ||
CERT-EU | a year ago | ||
Flashpoint | 9 months ago | ||
CERT-EU | 9 months ago | ||
CERT-EU | 9 months ago | ||
CERT-EU | 9 months ago | ||
CERT-EU | 9 months ago | ||
CERT-EU | 9 months ago | ||
CERT-EU | 9 months ago | ||
CERT-EU | a year ago | ||
CSO Online | 2 years ago | ||
CERT-EU | 2 years ago | ||
CERT-EU | 2 years ago |