Evil Corp
Russian cybercrime syndicate publicly attributed by the U.S. Treasury OFAC in December 2019, which sanctioned founder Maksim Yakubets. Operators of the Dridex banking trojan, the BitPaymer and WastedLocker ransomware families, and (per UK NCA October 2024 attribution) the LockBit and HIVE affiliate ecosystems. Treasury attribution made paying their ransoms a sanctions-compliance risk, which the group worked around via brand rotation.
Aliases
Motivations
Target sectors
Target countries
Diamond Model
Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.
MITRE ATT&CK techniques
Tools & malware
1 entryTimeline
6 events- SanctionHigh2024-10-01·US Department of the Treasury
US, UK and Australia issue trilateral Evil Corp sanctions naming FSB enabler Benderskiy
OFAC, the UK Foreign, Commonwealth & Development Office and Australia's Department of Foreign Affairs and Trade jointly sanctioned seven more individuals and two entities tied to Evil Corp. Treasury named Eduard Benderskiy — a former FSB Vympel officer and Yakubets' father-in-law — as the broker who shielded the group from Russian internal authorities after the 2019 designations. The action coincided with Operation Cronos revelations linking Evil Corp deputy Aleksandr Ryzhenkov to LockBit affiliate activity.
sanctionsofacfsblockbitoperation-cronos - AnnouncementHigh2024-10-01·UK National Crime Agency
UK NCA unmasks Evil Corp's Aleksandr Ryzhenkov as a LockBit affiliate
The UK National Crime Agency announced that data recovered during Operation Cronos identified Aleksandr Ryzhenkov, Maksim Yakubets' deputy, as a prolific LockBit affiliate responsible for attacks against at least 60 organizations since 2022. The NCA framed the move as evidence that 2019 sanctions had forced Evil Corp to abandon proprietary ransomware brands — WastedLocker, Hades, PhoenixLocker, PayloadBIN, Macaw — in favour of operating under established ransomware-as-a-service programmes.
ncalockbitoperation-cronosransomware - CompromiseHigh2020-07-24·BleepingComputer
Garmin global outage attributed to Evil Corp WastedLocker ransomware
BleepingComputer confirmed that the 23 July 2020 outage of Garmin Connect, flyGarmin, inReach and related services was caused by a WastedLocker ransomware infection attributed to Evil Corp. Encrypted files carried a '.garminwasted' extension and the operator-issued ransom notes reportedly demanded $10 million. The incident illustrated Evil Corp's post-sanctions pivot from Dridex banking fraud to big-game ransomware.
ransomwarewastedlockergarminbig-game - ReportHigh2020-06-25·Symantec (Broadcom)
Symantec discloses WastedLocker wave against 31 US organizations
Symantec's Threat Hunter Team disclosed a wave of WastedLocker ransomware attacks attributed to Evil Corp targeting at least 31 US organizations, including eight Fortune 500 companies across manufacturing, IT and media. The intrusion chain began with the SocGholish JavaScript framework delivered through compromised legitimate websites, followed by Cobalt Strike for lateral movement and culminating in WastedLocker deployment.
ransomwarewastedlockersocgholishcobalt-strike - SanctionHigh2019-12-05·US Department of the Treasury
US Treasury sanctions Evil Corp and designates Maksim Yakubets
The US Treasury's Office of Foreign Assets Control (OFAC) designated Evil Corp together with 17 individuals and seven entities, including alleged leader Maksim Viktorovich Yakubets and administrator Igor Turashev. Treasury attributed the Dridex banking-trojan operation to the group and stated it had caused more than $100 million in theft from financial institutions in over 40 countries. The action was coordinated with the United Kingdom and Australia.
sanctionsofacdridexfinancial-crime - IndictmentHigh2019-12-05·FBI
DOJ indicts Maksim Yakubets and Igor Turashev over Bugat/Dridex scheme
A federal grand jury in the Western District of Pennsylvania returned a 10-count indictment charging Maksim Yakubets and Igor Turashev with conspiracy, computer hacking, wire fraud and bank fraud tied to the Bugat / Dridex / Kridex malware family. Yakubets, alias 'aqua', was identified as the leader of Evil Corp; the State Department concurrently announced a $5 million Transnational Organized Crime Rewards Program bounty for information leading to his arrest or conviction — the largest such reward for a cybercriminal to that date.
indictmentdridexbugatdoj
Indicators of compromise
2 indicators| Type | Value | First seen | Source |
|---|---|---|---|
| SHA-1 | family · WastedLocker Second WastedLocker payload hash from Symantec's June 2020 report on Evil Corp's coordinated US ransomware campaign. | Jun 24, 2020 | Symantec (Broadcom) |
| SHA-1 | family · WastedLocker WastedLocker ransomware sample published in Symantec's June 2020 analysis of Evil Corp attacks against US organizations. | Jun 24, 2020 | Symantec (Broadcom) |
Related actors
shared ATT&CK techniques- KP · DPRKLazarus Group3 shared techniques
- KP · DPRKAndariel2 shared techniques
- IR · IranAPT392 shared techniques
- ?? · UnknownBlackSuit2 shared techniques
- KP · DPRKBlueNoroff2 shared techniques
- ?? · UnknownFIN72 shared techniques
References
cite this page
Threat Intel Tracker. (2026-05-19). Evil Corp — actor profile. Retrieved from https://threatintel.local/actors/evil-corp