Russian ‘Evil Corp’ is Behind a Decade of Hacks, US Says
WASHINGTON — The U.S. unveiled criminal charges and sanctions against members of a hacking group that calls itself Evil Corp, which authorities blame for some of the worst computer hacking and bank fraud schemes of the past decade.
The Justice Department, working mainly with the Treasury Department and British authorities, brought conspiracy and fraud charges against members of the group. It said it “has been engaged in cybercrime on an almost unimaginable scale,” using malware to steal tens of millions of dollars from customers doing online banking. Treasury said it would sanction the group and its leaders for cyber thefts committed at hundreds of financial institutions around the world.
The group’s alleged leader, identified as Maksim Yakubets, also worked for the Russian Federal Security Service intelligence agency, according to the Treasury Department. Yakubets was directed to work on projects for the Russian state starting in 2017, it said. The Russian ambassador to the U.S., Anatoly Antonov, called the accusation “groundless.”
The almost comically named outfit is “the world’s most harmful cyber crime group,” the U.K.’s National Crime Agency said in a statement, adding that its malware had caused hundreds of millions of pounds in financial losses in the U.K. alone. Its alleged leaders hardly kept a low profile, the NCA said. Yakubets drove a Lamborghini with a license plate that translates to “Thief” and spent more than a quarter of a million pounds on his wedding.
The U.S. charged Yakubets in Nebraska and Pennsylvania, while bringing charges against an alleged co-conspirator, Igor Turashev, in Pennsylvania. The two are believed to be in Russia, according to the Federal Bureau of Investigation. The U.S. is offering a $5 million reward for information leading to Yakubets’ arrest or conviction, the State Department said.
The group used a kind of malware called Dridex to harvest log-in credentials for financial institutions in more than 40 countries, according to the Treasury Department. Dridex, also known as Bugat and Cridex, often reaches victims through phishing emails. It “automates the theft of confidential personal and financial information, such as online banking credentials, from infected computers through the use of keystroke logging and web injects,” the U.S. said.
Using the malware, the group attempted a theft of about $220 million, with actual losses of about $70 million, according to the Justice Department. Victims of the scam include Penneco Oil Co., which had about $3.5 million taken from its accounts at First Commonwealth Bank in Pennsylvania in two transactions, and a host of small businesses and organizations, according to the government. The group allegedly hacked an order of nuns, the Franciscan Sisters of Chicago, using its credentials to make off with more than $24,000 from its account at Bank of America Corp. A Bank of America spokesman declined to comment.
Over the past two years, the distribution of banking malware has increasingly preceded “more damaging intrusions,” including the distribution of disruptive ransomware, according to Kimberly Goody, a manager of financial crime analysis at the cybersecurity firm FireEye Inc.
“The association between the claimed leader of this operation and the FSB is consistent with ties that we have previously seen between state-sponsored actors and criminal groups,” she said in a statement, referring to Russia’s Federal Security Service.
Dridex hackers “appear to direct the majority of attacks at English-speaking countries,” the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency said in an alert. The “massive spam campaigns” that distribute Dridex send “up to millions of messages per day,” the alert said.
“Our goal is to shut down Evil Corp, deter the distribution of Dridex, target the ‘money mule’ network used to transfer stolen funds, and ultimately to protect our citizens from the group’s criminal activities,” Treasury Secretary Steven Mnuchin said in a statement.
Yakubets “is not the first cyber criminal to be tied to the Russian government,” Treasury said in a statement, citing the 2017 indictment of two FSB officers and conspirators for compromising “millions” of Yahoo Holdings Inc. email accounts. An alleged co-conspirator in the Nebraska complaint unsealed Thursday, Yevgeny Bogachev, was sanctioned by the U.S. in 2016 and has been on the FBI’s most-wanted list.
Treasury officials said the U.S. action was coordinated not only with the U.K. but also with others targeted by the group, including Italy, Australia, the United Arab Emirates, Canada, France, India, Hong Kong and Malaysia.
Law enforcement has been after the group for several years. Two Ukrainian nationals were extradited from the U.K. to the U.S. and pleaded guilty to related charges in Nebraska in 2015, the Justice Department said. In October of that year, U.S. prosecutors also indicted Moldovan national Andrey Ghinkul for cyberattacks using Dridex.
Dridex is “one of the most prevalent eCrime malware families,” according to a July report by the cybersecurity firm Crowdstrike, which said it was used significantly in 2015 and 2016.
FBI Deputy Director David Bowdich said Evil Corp and other cyber criminals are still operating, and that one reason the U.S. brought the charges forward now was to raise awareness about future attacks.
“It is fair to say they are not out of business at this point,” he said.
David Voreacos, Lananh Nguyen and Alex Nicholson contributed to this report.
©2019 Bloomberg News
Visit Bloomberg News at www.bloomberg.com
Distributed by Tribune Content Agency, LLC.
In The News
WASHINGTON — In early 2017 the Central Intelligence Agency suffered a massive data loss when an agency employee stole vast quantities of information including some of its most secretive hacking tools because of lax cybersecurity measures, according to a redacted investigation report obtained by Sen. Ron... Read More
WASHINGTON — In the midst of the coronavirus pandemic, staffers at the Champaign-Urbana Public Health District in Illinois got an unwelcome surprise when they arrived at work one morning last month: Cybercriminals had hijacked their computer network and were holding it hostage. The hackers were demanding... Read More
WASHINGTON — Cash-strapped states, which Congress just pumped $150 billion into, will nonetheless have to pony up in order to access new election security grants in the massive new coronavirus aid package signed by President Donald Trump. The $2.3 trillion aid bill contains $400 million to... Read More
WASHINGTON — From disgraced televangelist Jim Bakker in Missouri to a convenience store operator in New Jersey, suspected fraudsters are trying to take advantage of the coronavirus panic to trick consumers into buying useless or harmful products, triggering state anti-gouging laws and anti-fraud efforts by state... Read More
WASHINGTON — An email seemingly from the U.S. Centers for Disease Control and Prevention warns of new coronavirus infections and urges readers to click on a link to see a list of infections in their community. But the email actually comes from cybercriminals looking to use... Read More
WASHINGTON — When cybercriminals struck Lake City, Fla., last June, city officials had to make a tough choice: Pay the hackers or restore systems on their own. A ransomware attack had hijacked the government’s computer network and held it hostage for several weeks. While the attack... Read More