Some members even collaborated with other crime groups, like LockBit, for technical tools.The NCA continues to track former Evil Corp members involved in ransomware activities. Further Evil Corp cyber criminals exposed following NCA investigation, one unmasked as LockBit affiliate, as UK, US and Australia unveil sanctions. The NCA’s Director General for Threats, James Babbage, emphasized the importance of these actions: “These sanctions expose further members of Evil Corp and those critical to enabling their activity. Authorities in the UK, US, and Australia have sanctioned sixteen individuals linked to Evil Corp, a group once considered the pinnacle of global cyber threats. Following US sanctions in 2019, Benderskiy leveraged his connections to shield Evil Corp’s senior members from Russian authorities. Before 2019, Russian Intelligence Services reportedly tasked Evil Corp with executing cyber attacks against NATO allies. Originating as a family-centered financial crime group in Moscow, Evil Corp evolved into a formidable cybercrime entity, extorting over $300 million from victims worldwide. Divya is a Senior Journalist at Cyber Security news covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world. In 2019, the US indicted Maksim Yakubets, Evil Corp’s head, Igor Turashev, and several other members. The National Crime Agency (NCA) has played a pivotal role in unraveling the complex web of Evil Corp’s operations. The sanctions are part of a broader international effort to dismantle Evil Corp’s operations. This new wave of sanctions includes previously unidentified members like Aleksandr Ryzhenkov, Yakubets’ trusted lieutenant and a known LockBit affiliate. This move exposes their connections to the Russian state and other infamous ransomware groups, including LockBit. Evil Corp’s strategies shifted post-2019 sanctions.
This Cyber News was published on cybersecuritynews.com. Publication date: Wed, 02 Oct 2024 07:05:21 +0000