The person at the center of this case
United States and international businesses, critical infrastructure, and law enforcement agencies (victims of ransomware attacks)
Justice for United States and international businesses, critical infrastructure, and law enforcement agencies (victims of ransomware attacks) — the trail went cold in 2022, but the truth hasn't.
Start here
What is Matveev's current location and operational status within Russia's cybercriminal infrastructure?
How can attribution be strengthened for specific Lockbit, Babuk, and Hive attacks to individual actors?
Why does Matveev maintain ties to both Kaliningrad and St. Petersburg, and what operational purpose do these locations serve?
Mikhail Pavlovich Matveev, a Russian national, is a prolific ransomware affiliate allegedly responsible for major cyberattacks against U.S. and international targets, including critical infrastructure and law enforcement agencies. He is linked to Lockbit, Babuk, and Hive ransomware variants and has conducted attacks on the Washington D.C. Metropolitan Police Department, New Jersey police departments, and numerous businesses. Federal warrants were issued in December 2022 following charges in Washington D.C. and New Jersey; Matveev remains at large with known ties to Kaliningrad and St. Petersburg, Russia.
Try asking
A one-time $10 claim transfers this imported case workspace to your account. You get 10 uploads for this case, 25 daily AI questions for this case, and public tips with files route to you.
This does not start a subscription. When the included limits are reached, the Personal plan unlocks more workspace capacity.
Beyond the top three above — each detail below could be the thread that pulls this case open.
What was the significance of Matveev's previous travel to Thailand, and does it indicate international operational networks?
Who are Matveev's known associates and collaborators within the ransomware affiliate ecosystem?
Even the smallest detail could be the key to solving this case.
Official wording
Computer Intrusion; Conspiracy; Intentional Damage to a Protected Computer; Threats Relating to a Protected Computer; Aiding and Abetting Caution: Mikhail Pavlovich Matveev, a Russian National, is allegedly a prolific ransomware affiliate currently based in Russia. Matveev has been linked to numerous ransomware variants including Lockbit, Babuk, and Hive.
He has allegedly conducted significant attacks against both United States and worldwide businesses, including critical infrastructure. Matveev has also been identified as one of the alleged developers/administrators behind the Babuk ransomware variant.
Matveev has been charged with multiple Lockbit attacks to include a police department located within New Jersey. He has also been charged with multiple Babuk attacks to include the attack against the Washington D.C.
Metropolitan Police Department. In addition, Matveev has been charged with Hive-related counts of conspiracy and intentional damage to a protected computer, including an attack against a New Jersey-based company.
On December 6, 2022, Matveev was charged with Intentional Damage to a Protected Computer; Threats Relating to a Protected Computer; and Aiding and Abetting in the United States District Court for the District of Columbia, Washington, D.C., and a federal warrant was issued for his arrest. On December 8, 2022, Matveev was charged with Computer Intrusion and Conspiracy in the United States District Court for the District of New Jersey, Newark, New Jersey, and a federal warrant was issued for his arrest.
Remarks: Matveev has ties to both Kaliningrad, Russia, and St. Petersburg, Russia, and is known to travel between the two locations.
In addition, Matveev has previously traveled to Thailand.
Charged with Intentional Damage to a Protected Computer, Threats Relating to a Protected Computer, and Aiding and Abetting in the U.S. District Court for the District of Columbia; federal warrant issued
Charged with Computer Intrusion and Conspiracy in the U.S. District Court for the District of New Jersey, Newark; federal warrant issued