Evil Corp Hackers Charged For Stealing Over $100 Million

Evil Corp Hackers Charged For Stealing Over $100 Million

After the indictment was revealed, the US Treasury Department invoked the CAATSA sanctions bill to blacklist Yakubets, Turashev and 15 other people, along with seven companies - including "Evil Corp", a designation that does not appear in the DOJ statements but nevertheless somehow became the widely used name for the alleged crime syndicate in the US press. "Bugat malware was specifically crafted to defeat antivirus and other protective measures employed by victims".

The indictment was accompanied by sanctions from the US Treasury on the two men, as well as the announcement of a $5 million reward toward Yakubets' arrest and conviction - the highest reward ever offered for a cybercriminal. "Later versions of the malware were designed with the added function of assisting in the installation of ransomware".

They're also the most prolific, and one relevant example is a hacking group known as "Evil Corp", which was able to steal no less than $100 million dollars from bank accounts in 40 countries over the last few years using a combination of phishing campaigns and banking malware against individuals and major corporations.

Officials say Evil Corp. developed and distributed a type of malware that infected computers around the world and harvested banking credentials in order to steal some $100 million.

He continued: "Our goal is to shut down Evil Corp, deter the distribution of Dridex, target the 'money mule 'network used to transfer stolen funds, and ultimately to protect our citizens from the group's criminal activities".

"Maksim Yakubets allegedly has engaged in a decade-long cybercrime spree that deployed two of the most damaging pieces of financial malware ever used and resulted in tens of millions of dollars of losses to victims worldwide", Assistant Attorney General Benczkowski said.

According to the Justice Department, the Federal Bureau of Investigation discovered the identities of both Russian cybercriminals with the help of its foreign counterpart National Crime Agency (NCA) in the United Kingdom. He was an administrator since 2015 and was also in control over Dridex malware deployment campaigns.

"Investigations in the United Kingdom by the NCA and the Metropolitan Police have also targeted Yakubets' network of money launderers who have funnelled profits back to Evil Corp". According to The Washington Post, targeted companies included a dairy company in OH, a luggage store in New Mexico and an order of religious sisters.

Treasury Secretary Steven Mnuchin went so far as to call the organization a "Russian-based hacker group", and accuse Yakubets and his associates of working for the Russian intelligence agency FSB, "highlighting the Russian government's enlistment of cybercriminals for its own malicious purposes".

"This coordinated action is meant to disrupt the massive phishing campaigns orchestrated by this Russian-based hacker group", said Mnuchin.

Both men are believed to be in Russian Federation, and face possible extradition to the United States if they are arrested in other countries.

Related Articles