threatintel
actor tracker
All actors

Evil Corp

evil-corp · primary source: Other · first observed 2013
RU · RussiaCybercrimeHigh confidencelast cited Sep 30, 2024 · 1.6y ago

Russian cybercrime syndicate publicly attributed by the U.S. Treasury OFAC in December 2019, which sanctioned founder Maksim Yakubets. Operators of the Dridex banking trojan, the BitPaymer and WastedLocker ransomware families, and (per UK NCA October 2024 attribution) the LockBit and HIVE affiliate ecosystems. Treasury attribution made paying their ransoms a sanctions-compliance risk, which the group worked around via brand rotation.

Aliases

Indrik SpiderCrowdStrikeManatee TempestMicrosoftDEV-0243Microsoft

Motivations

financial gain

Target sectors

financialmanufacturingmediahealthcare

Target countries

USGBFRDEES

Diamond Model

Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.

Adversary
  • Evil Corp
  • Russia
  • financial gain
Infrastructure
Victim
  • financial
  • manufacturing
  • media
  • US
  • GB
  • +1 more

MITRE ATT&CK techniques

Tools & malware

1 entry

Timeline

6 events
  1. SanctionHigh2024-10-01·US Department of the Treasury

    US, UK and Australia issue trilateral Evil Corp sanctions naming FSB enabler Benderskiy

    OFAC, the UK Foreign, Commonwealth & Development Office and Australia's Department of Foreign Affairs and Trade jointly sanctioned seven more individuals and two entities tied to Evil Corp. Treasury named Eduard Benderskiy — a former FSB Vympel officer and Yakubets' father-in-law — as the broker who shielded the group from Russian internal authorities after the 2019 designations. The action coincided with Operation Cronos revelations linking Evil Corp deputy Aleksandr Ryzhenkov to LockBit affiliate activity.

    sanctionsofacfsblockbitoperation-cronos
  2. AnnouncementHigh2024-10-01·UK National Crime Agency

    UK NCA unmasks Evil Corp's Aleksandr Ryzhenkov as a LockBit affiliate

    The UK National Crime Agency announced that data recovered during Operation Cronos identified Aleksandr Ryzhenkov, Maksim Yakubets' deputy, as a prolific LockBit affiliate responsible for attacks against at least 60 organizations since 2022. The NCA framed the move as evidence that 2019 sanctions had forced Evil Corp to abandon proprietary ransomware brands — WastedLocker, Hades, PhoenixLocker, PayloadBIN, Macaw — in favour of operating under established ransomware-as-a-service programmes.

    ncalockbitoperation-cronosransomware
  3. CompromiseHigh2020-07-24·BleepingComputer

    Garmin global outage attributed to Evil Corp WastedLocker ransomware

    BleepingComputer confirmed that the 23 July 2020 outage of Garmin Connect, flyGarmin, inReach and related services was caused by a WastedLocker ransomware infection attributed to Evil Corp. Encrypted files carried a '.garminwasted' extension and the operator-issued ransom notes reportedly demanded $10 million. The incident illustrated Evil Corp's post-sanctions pivot from Dridex banking fraud to big-game ransomware.

    ransomwarewastedlockergarminbig-game
  4. ReportHigh2020-06-25·Symantec (Broadcom)

    Symantec discloses WastedLocker wave against 31 US organizations

    Symantec's Threat Hunter Team disclosed a wave of WastedLocker ransomware attacks attributed to Evil Corp targeting at least 31 US organizations, including eight Fortune 500 companies across manufacturing, IT and media. The intrusion chain began with the SocGholish JavaScript framework delivered through compromised legitimate websites, followed by Cobalt Strike for lateral movement and culminating in WastedLocker deployment.

    ransomwarewastedlockersocgholishcobalt-strike
  5. SanctionHigh2019-12-05·US Department of the Treasury

    US Treasury sanctions Evil Corp and designates Maksim Yakubets

    The US Treasury's Office of Foreign Assets Control (OFAC) designated Evil Corp together with 17 individuals and seven entities, including alleged leader Maksim Viktorovich Yakubets and administrator Igor Turashev. Treasury attributed the Dridex banking-trojan operation to the group and stated it had caused more than $100 million in theft from financial institutions in over 40 countries. The action was coordinated with the United Kingdom and Australia.

    sanctionsofacdridexfinancial-crime
  6. IndictmentHigh2019-12-05·FBI

    DOJ indicts Maksim Yakubets and Igor Turashev over Bugat/Dridex scheme

    A federal grand jury in the Western District of Pennsylvania returned a 10-count indictment charging Maksim Yakubets and Igor Turashev with conspiracy, computer hacking, wire fraud and bank fraud tied to the Bugat / Dridex / Kridex malware family. Yakubets, alias 'aqua', was identified as the leader of Evil Corp; the State Department concurrently announced a $5 million Transnational Organized Crime Rewards Program bounty for information leading to his arrest or conviction — the largest such reward for a cybercriminal to that date.

    indictmentdridexbugatdoj

Indicators of compromise

2 indicators
csv
TypeValueFirst seenSource
SHA-1
887aac61771af200f7e58bf0d02cb96d9befa11d
family · WastedLocker
Second WastedLocker payload hash from Symantec's June 2020 report on Evil Corp's coordinated US ransomware campaign.
Jun 24, 2020Symantec (Broadcom)
SHA-1
5cd04805f9753ca08b82e88c27bf5426d1d356bb
family · WastedLocker
WastedLocker ransomware sample published in Symantec's June 2020 analysis of Evil Corp attacks against US organizations.
Jun 24, 2020Symantec (Broadcom)

Related actors

shared ATT&CK techniques

References

cite this page

Threat Intel Tracker. (2026-05-19). Evil Corp — actor profile. Retrieved from https://threatintel.local/actors/evil-corp

latest cited activity · 2024-10-01 · 2 cataloged indicators