Russian ‘Evil Corp’ is Behind a Decade of Hacks, US Says
WASHINGTON — The U.S. unveiled criminal charges and sanctions against members of a hacking group that calls itself Evil Corp, which authorities blame for some of the worst computer hacking and bank fraud schemes of the past decade.
The Justice Department, working mainly with the Treasury Department and British authorities, brought conspiracy and fraud charges against members of the group. It said it “has been engaged in cybercrime on an almost unimaginable scale,” using malware to steal tens of millions of dollars from customers doing online banking. Treasury said it would sanction the group and its leaders for cyber thefts committed at hundreds of financial institutions around the world.
The group’s alleged leader, identified as Maksim Yakubets, also worked for the Russian Federal Security Service intelligence agency, according to the Treasury Department. Yakubets was directed to work on projects for the Russian state starting in 2017, it said. The Russian ambassador to the U.S., Anatoly Antonov, called the accusation “groundless.”
The almost comically named outfit is “the world’s most harmful cyber crime group,” the U.K.’s National Crime Agency said in a statement, adding that its malware had caused hundreds of millions of pounds in financial losses in the U.K. alone. Its alleged leaders hardly kept a low profile, the NCA said. Yakubets drove a Lamborghini with a license plate that translates to “Thief” and spent more than a quarter of a million pounds on his wedding.
The U.S. charged Yakubets in Nebraska and Pennsylvania, while bringing charges against an alleged co-conspirator, Igor Turashev, in Pennsylvania. The two are believed to be in Russia, according to the Federal Bureau of Investigation. The U.S. is offering a $5 million reward for information leading to Yakubets’ arrest or conviction, the State Department said.
The group used a kind of malware called Dridex to harvest log-in credentials for financial institutions in more than 40 countries, according to the Treasury Department. Dridex, also known as Bugat and Cridex, often reaches victims through phishing emails. It “automates the theft of confidential personal and financial information, such as online banking credentials, from infected computers through the use of keystroke logging and web injects,” the U.S. said.
Using the malware, the group attempted a theft of about $220 million, with actual losses of about $70 million, according to the Justice Department. Victims of the scam include Penneco Oil Co., which had about $3.5 million taken from its accounts at First Commonwealth Bank in Pennsylvania in two transactions, and a host of small businesses and organizations, according to the government. The group allegedly hacked an order of nuns, the Franciscan Sisters of Chicago, using its credentials to make off with more than $24,000 from its account at Bank of America Corp. A Bank of America spokesman declined to comment.
Over the past two years, the distribution of banking malware has increasingly preceded “more damaging intrusions,” including the distribution of disruptive ransomware, according to Kimberly Goody, a manager of financial crime analysis at the cybersecurity firm FireEye Inc.
“The association between the claimed leader of this operation and the FSB is consistent with ties that we have previously seen between state-sponsored actors and criminal groups,” she said in a statement, referring to Russia’s Federal Security Service.
Dridex hackers “appear to direct the majority of attacks at English-speaking countries,” the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency said in an alert. The “massive spam campaigns” that distribute Dridex send “up to millions of messages per day,” the alert said.
“Our goal is to shut down Evil Corp, deter the distribution of Dridex, target the ‘money mule’ network used to transfer stolen funds, and ultimately to protect our citizens from the group’s criminal activities,” Treasury Secretary Steven Mnuchin said in a statement.
Yakubets “is not the first cyber criminal to be tied to the Russian government,” Treasury said in a statement, citing the 2017 indictment of two FSB officers and conspirators for compromising “millions” of Yahoo Holdings Inc. email accounts. An alleged co-conspirator in the Nebraska complaint unsealed Thursday, Yevgeny Bogachev, was sanctioned by the U.S. in 2016 and has been on the FBI’s most-wanted list.
Treasury officials said the U.S. action was coordinated not only with the U.K. but also with others targeted by the group, including Italy, Australia, the United Arab Emirates, Canada, France, India, Hong Kong and Malaysia.
Law enforcement has been after the group for several years. Two Ukrainian nationals were extradited from the U.K. to the U.S. and pleaded guilty to related charges in Nebraska in 2015, the Justice Department said. In October of that year, U.S. prosecutors also indicted Moldovan national Andrey Ghinkul for cyberattacks using Dridex.
Dridex is “one of the most prevalent eCrime malware families,” according to a July report by the cybersecurity firm Crowdstrike, which said it was used significantly in 2015 and 2016.
FBI Deputy Director David Bowdich said Evil Corp and other cyber criminals are still operating, and that one reason the U.S. brought the charges forward now was to raise awareness about future attacks.
“It is fair to say they are not out of business at this point,” he said.
David Voreacos, Lananh Nguyen and Alex Nicholson contributed to this report.
©2019 Bloomberg News
Visit Bloomberg News at www.bloomberg.com
Distributed by Tribune Content Agency, LLC.
In The News
WASHINGTON -- If everyone were to employ proper cyber hygiene like multi-factor authentication or not clicking on links in phishing... Read More
WASHINGTON -- If everyone were to employ proper cyber hygiene like multi-factor authentication or not clicking on links in phishing emails, more than 85% of cyberattacks would be prevented, said Sen. Angus King, I-Maine, Thursday. “The best hack is the one that doesn’t happen,” King said... Read More
North American governments should come together to create a trilateral strategy to assess and address threats in a holistic risk-based... Read More
North American governments should come together to create a trilateral strategy to assess and address threats in a holistic risk-based approach to cybersecurity that includes a minimum set of standards, said three experts yesterday. As much as the pandemic has accelerated the rate in which governments... Read More
WASHINGTON -- The Cybersecurity Infrastructure and Security Agency has met President Biden’s cybersecurity executive order’s “highly aggressive deadlines so far,”... Read More
WASHINGTON -- The Cybersecurity Infrastructure and Security Agency has met President Biden’s cybersecurity executive order’s “highly aggressive deadlines so far,” but there is “still a lot of work to do,” said CISA Director Jen Easterly Wednesday. Kicking off the 6th annual Aspen Cyber Summit, Exploring Collective... Read More
WASHINGTON -- Identity authentication is taking a front-and-center role in the administration's approach to ensuring robust cybersecurity across the U.S.... Read More
WASHINGTON -- Identity authentication is taking a front-and-center role in the administration's approach to ensuring robust cybersecurity across the U.S. government, according to Carole House, director of cybersecurity and secure digital Innovation at the White House National Security Council. It “sits at the heart of zero... Read More
WASHINGTON -- A cybersecurity expert told a congressional panel Wednesday that private industry alone cannot be expected to effectively confront... Read More
WASHINGTON -- A cybersecurity expert told a congressional panel Wednesday that private industry alone cannot be expected to effectively confront the kinds of cyberattacks that have wreaked havoc on U.S. computer networks in recent years. He testified to a House Homeland Security subcommittee as it considers... Read More
WASHINGTON — The Federal Bureau of Investigation distributed a Flash report on Friday warning of indicators of compromise from the... Read More
WASHINGTON — The Federal Bureau of Investigation distributed a Flash report on Friday warning of indicators of compromise from the Hive ransomware known to have infiltrated business networks. The ransomware utilizes multiple mechanisms as attachments to gain access and “Remote Desktop Protocol” to operate once embedded,... Read More