LockBit Ransomware and Evil Corp Leaders Arrested and Sanctioned in Joint World Effort

Oct 03, 2024Ravie LakshmananCybercrime / Ransomware

A brand new wave of worldwide regulation enforcement actions has led to 4 arrests and the takedown of 9 servers linked to the LockBit (aka Bitwise Spider) ransomware operation, marking the newest salvo towards what was as soon as a prolific financially motivated group.

This contains the arrest of a suspected LockBit developer in France whereas on vacation exterior of Russia, two people within the U.Ok. who allegedly supported an affiliate, and an administrator of a bulletproof internet hosting service in Spain utilized by the ransomware group, Europol stated in a press release.

In conjunction, authorities outed a Russian nationwide named Aleksandr Ryzhenkov (aka Beverley, Corbyn_Dallas, G, Guester, and Kotosel) as one of many high-ranking members of the Evil Corp cybercrime group, whereas concurrently portray him as a LockBit affiliate. Sanctions have additionally been introduced towards seven people and two entities linked to the e-crime gang.

Cybersecurity

“The United States, in close coordination with our allies and partners, including through the Counter Ransomware Initiative, will continue to expose and disrupt the criminal networks that seek personal profit from the pain and suffering of their victims,” stated Appearing Underneath Secretary of the Treasury for Terrorism and Monetary Intelligence, Bradley T. Smith.

The event, a part of a collaborative train dubbed Operation Cronos, comes practically eight months after LockBit’s on-line infrastructure was seized. It additionally follows sanctions levied towards Dmitry Yuryevich Khoroshev, who was revealed to be the administrator and particular person behind the “LockBitSupp” persona.

A complete of 16 people who have been a part of Evil Corp have been sanctioned by the U.Ok. Additionally tracked as Gold Drake and Indrik Spider, the notorious hacking crew has been lively since 2014, concentrating on banks and monetary establishments with the final word aim of stealing customers’ credentials and monetary info with a view to facilitate unauthorized fund transfers.

LockBit Ransomware and Evil Corp

The group, liable for the event and distribution of the Dridex (aka Bugat) malware, has been beforehand noticed deploying LockBit and different ransomware strains in 2022 with a view to get round sanctions imposed towards the group in December 2019, together with key members Maksim Yakubets and Igor Turashev.

Ryzhenkov has been described by the U.Ok. Nationwide Crime Company (NCA) as Yakubets’ right-hand man, with the U.S. Division of Justice (DoJ) accusing him of deploying BitPaymer ransomware to focus on victims throughout the nation since no less than June 2017.

“Ryzhenkov used the affiliate name Beverley, made over 60 LockBit ransomware builds and sought to extort at least $100 million from victims in ransom demands,” officers stated. “Ryzhenkov additionally has been linked to the alias mx1r and associated with UNC2165 (an evolution of Evil Corp affiliated actors).”

Moreover, Ryzhenkov’s brother Sergey Ryzhenkov, who’s believed to make use of the net alias Epoch, has been linked to BitPaymer, per cybersecurity agency Crowdstrike, which assisted the NCA within the effort.

Cybersecurity

“Throughout 2024, Indrik Spider gained initial access to multiple entities through the Fake Browser Update (FBU) malware-distribution service,” it famous. “The adversary was last seen deploying LockBit during an incident that occurred during Q2 2024.”

Notable among the many people subjected to sanctions are Yakubets’ father, Viktor Yakubets, and his father-in-law, Eduard Benderskiy, a former high-ranking FSB official, underscoring the deep connection between Russian cybercrime teams and the Kremlin.

“The group were in a privileged position, with some members having close links to the Russian state,” the NCA stated. “Benderskiy was a key enabler of their relationship with the Russian Intelligence Services who, prior to 2019, tasked Evil Corp to conduct cyber attacks and espionage operations against NATO allies.”

“After the U.S. sanctions and indictments in December 2019, Benderskiy used his extensive influence with the Russian state to protect the group, both by providing senior members with security and by ensuring they were not pursued by Russian internal authorities.”

Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we publish.

Recent articles

U.S. Sanctions Chinese language Cybersecurity Agency Over Treasury Hack Tied to Silk Hurricane

The U.S. Treasury Division's Workplace of International Property Management...

FTC cracks down on Genshin Impression gacha loot field practices

Genshin Impression developer Cognosphere (aka Hoyoverse)...

New ‘Sneaky 2FA’ Phishing Package Targets Microsoft 365 Accounts with 2FA Code Bypass

Jan 17, 2025Ravie LakshmananCybersecurity / Menace Intelligence Cybersecurity researchers have...