Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Russian Hacker Who Helped Yanluowang Ransomware Gang Gets Nearly 7-Year Prison Sentence
Russian Hacker Who Helped Yanluowang Ransomware Gang Gets Nearly 7-Year Prison Sentence
NEWS

Russian Hacker Who Helped Yanluowang Ransomware Gang Gets Nearly 7-Year Prison Sentence

Aleksei Volkov, a Russian initial access broker who sold unauthorized access to U.S. companies for the Yanluowang ransomware group, has been sentenced to...

Dylan H.

News Desk

March 24, 2026
3 min read

A Russian citizen who operated as an initial access broker for the Yanluowang ransomware group has been sentenced to 81 months (6.75 years) in U.S. federal prison, the Department of Justice announced on March 23, 2026. The defendant, Aleksei Olegovich Volkov, 26, also known online as chubaka.kor, was ordered to pay $9,167,198.19 in restitution to victims and will serve two years of supervised probation following his release.

Who Is Aleksei Volkov?

Volkov worked as what the cybersecurity industry calls an initial access broker (IAB) — a specialized criminal role that focuses on breaching corporate networks and then selling that unauthorized access to ransomware operators and other threat actors, rather than executing the full attack chain himself. Prosecutors described Volkov as particularly skilled at finding exploitable vulnerabilities in U.S. corporate networks, breaking in quietly, and auctioning off the "keys" to groups like Yanluowang.

Between July 2021 and November 2022, Volkov facilitated numerous ransomware attacks across the United States, targeting banks, telecommunications companies, and engineering firms in Pennsylvania, California, Michigan, Illinois, Georgia, and Ohio. Prosecutors calculated the attacks caused more than $9 million in actual losses and over $24 million in intended losses.

Arrest, Extradition, and Guilty Plea

After a multi-year FBI investigation, Volkov was arrested in Rome in January 2024 and subsequently extradited to the United States. On November 25, 2025, he pleaded guilty in two separate federal courts to a total of six counts:

  • Southern District of Indiana: Unlawful transfer of a means of identification, trafficking in access information, access device fraud, and aggravated identity theft.
  • Eastern District of Pennsylvania: Conspiracy to commit computer fraud and conspiracy to commit money laundering.

As part of his plea agreement, Volkov also agreed to the $9 million restitution order.

About Yanluowang Ransomware

The Yanluowang ransomware group, which Volkov supplied with corporate access, is a sophisticated threat actor first observed in 2021. The group is best known for employing "triple extortion" tactics — encrypting victim data, threatening public data leaks, and simultaneously launching distributed denial-of-service (DDoS) attacks against victims who refused to pay, while also placing threatening calls to employees and business partners.

Yanluowang previously claimed responsibility for a 2022 breach of Cisco's corporate network, which Cisco confirmed involved the compromise of an employee's personal Google account that synced corporate credentials.

Broader Law Enforcement Context

The sentencing of Volkov is part of a broader U.S. government push to prosecute every link in the ransomware supply chain — not just the operators who deploy ransomware, but also the access brokers, money launderers, and cryptocurrency cashers who make the ecosystem function. Initial access brokers are increasingly targeted by Western law enforcement because disrupting access sales upstream can prevent attacks before they begin.

The case was investigated by the FBI's Indianapolis and Philadelphia field offices, with assistance from Italian law enforcement authorities that facilitated Volkov's arrest and extradition.

#Ransomware#Russia#Cybercrime#DOJ#Yanluowang#Initial Access Broker

Related Articles

Manager of Botnet Used in Ransomware Attacks Gets 2 Years in Prison

Ilya Angelov, co-leader of the TA551/Mario Kart cybercrime group, was sentenced to two years in prison for operating a phishing botnet that sent 700,000...

4 min read

Phobos Ransomware Admin Pleads Guilty — 1,000+ Victims

Evgenii Ptitsyn, 43, a Russian national who administered the Phobos ransomware-as-a-service operation, pleaded guilty to wire fraud conspiracy in the U.S....

7 min read

Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware

Pro-Ukrainian hacktivist group Bearlyfy has conducted over 70 cyberattacks against Russian companies since January 2025, recently deploying a custom Windows ransomware strain called GenieLocker in targeted operations.

4 min read
Back to all News