• About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    Handala, Stryker Cyberattack, Iran Israel War

    Who Is Handala — The Iran-Linked Ghost Group That Just Wiped 200K Stryker Devices

    Android phone vulnerability

    Vulnerability in MediaTek Chips Could Impact 25% Android Smartphones

    UIDAI Bug Bounty

    India Introduces Bug Bounty Program to Target Gaps in Aadhaar Ecosystem

    AI child safety in India

    India Outlines Legal Framework to Protect Children from AI and Online Harm

    Russia and China Cyberespionage

    Finland Warns Russia and China Cyber Espionage Ops Targeting Tech Sector

    Microsoft Patch Tuesday March 2026

    Microsoft Patch Tuesday March 2026: Two Zero-Days and Critical RCE Bugs Fixed

    Planning and Zoning Permit Phishing Scam

    FBI Flags Phishing Campaign Collecting Planning and Zoning Permit Payments

    Cyber Risk Management CISO Hannah Suarez

    Cyber Risk Management Starts with Understanding the Business: CISO Hannah Suarez Explains Why

    Public Regional Hospital, cyberattack

    Cyberattack Forces Polish Hospital Revert to Paper-Based Operations

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    AI child safety in India

    India Outlines Legal Framework to Protect Children from AI and Online Harm

    Russia and China Cyberespionage

    Finland Warns Russia and China Cyber Espionage Ops Targeting Tech Sector

    Planning and Zoning Permit Phishing Scam

    FBI Flags Phishing Campaign Collecting Planning and Zoning Permit Payments

    op 50 Women in Cybersecurity to Watch in 2026

    Top 50 Women Leaders in Cybersecurity to Watch in 2026

    INC Ransom, Western Critical Infrastructure, Critical infrastructure, Russian GRU, Russian Threat Actor, Sandworm, APT44, Energy Supply Chain, Energy Infrastructure

    INC Ransom’s Franchise Model Is Putting Critical Infrastructure on the Chopping Block

    Stolen Credit Card Data Trafficking

    Chilean National Extradited to U.S. Over Stolen Credit Card Data Trafficking Scheme

    cybersecurity firewall

    Vietnam Announces National Cybersecurity Firewall Plan Under New Digital Governance Law

    government cyber security

    UK Tightens Government Cyber Security After Cutting Critical Vulnerabilities by 75%

    iphone, ipad, apple devices

    Apple Devices Become First Consumer Products Cleared for NATO Classified Data—But Questions Remain

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    INC Ransom, Western Critical Infrastructure, Critical infrastructure, Russian GRU, Russian Threat Actor, Sandworm, APT44, Energy Supply Chain, Energy Infrastructure

    INC Ransom’s Franchise Model Is Putting Critical Infrastructure on the Chopping Block

    Terrorist Cyberattacks, UAE Cyber Security Council

    UAE Blocked AI-Powered Terrorist Cyberattacks Targeting Critical Infrastructure

    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    National Security Agency (NSA) appointment

    NSA Appoints Timothy Kosiba to Oversee Strategy and Cybersecurity Operations

    Shinhan Card data breach

    South Korea’s Shinhan Card Data Breach Affects 192,000 Merchants

    Cyble's Beenu-Recognized-by-ET-Edge-as-an-Impactful-CEO-2025_

    Beenu Arora, CEO & Co-Founder of Cyble, Recognized by ET Edge as an Impactful CEO 2025

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    Handala, Stryker Cyberattack, Iran Israel War

    Who Is Handala — The Iran-Linked Ghost Group That Just Wiped 200K Stryker Devices

    Android phone vulnerability

    Vulnerability in MediaTek Chips Could Impact 25% Android Smartphones

    UIDAI Bug Bounty

    India Introduces Bug Bounty Program to Target Gaps in Aadhaar Ecosystem

    AI child safety in India

    India Outlines Legal Framework to Protect Children from AI and Online Harm

    Russia and China Cyberespionage

    Finland Warns Russia and China Cyber Espionage Ops Targeting Tech Sector

    Microsoft Patch Tuesday March 2026

    Microsoft Patch Tuesday March 2026: Two Zero-Days and Critical RCE Bugs Fixed

    Planning and Zoning Permit Phishing Scam

    FBI Flags Phishing Campaign Collecting Planning and Zoning Permit Payments

    Cyber Risk Management CISO Hannah Suarez

    Cyber Risk Management Starts with Understanding the Business: CISO Hannah Suarez Explains Why

    Public Regional Hospital, cyberattack

    Cyberattack Forces Polish Hospital Revert to Paper-Based Operations

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    AI child safety in India

    India Outlines Legal Framework to Protect Children from AI and Online Harm

    Russia and China Cyberespionage

    Finland Warns Russia and China Cyber Espionage Ops Targeting Tech Sector

    Planning and Zoning Permit Phishing Scam

    FBI Flags Phishing Campaign Collecting Planning and Zoning Permit Payments

    op 50 Women in Cybersecurity to Watch in 2026

    Top 50 Women Leaders in Cybersecurity to Watch in 2026

    INC Ransom, Western Critical Infrastructure, Critical infrastructure, Russian GRU, Russian Threat Actor, Sandworm, APT44, Energy Supply Chain, Energy Infrastructure

    INC Ransom’s Franchise Model Is Putting Critical Infrastructure on the Chopping Block

    Stolen Credit Card Data Trafficking

    Chilean National Extradited to U.S. Over Stolen Credit Card Data Trafficking Scheme

    cybersecurity firewall

    Vietnam Announces National Cybersecurity Firewall Plan Under New Digital Governance Law

    government cyber security

    UK Tightens Government Cyber Security After Cutting Critical Vulnerabilities by 75%

    iphone, ipad, apple devices

    Apple Devices Become First Consumer Products Cleared for NATO Classified Data—But Questions Remain

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    INC Ransom, Western Critical Infrastructure, Critical infrastructure, Russian GRU, Russian Threat Actor, Sandworm, APT44, Energy Supply Chain, Energy Infrastructure

    INC Ransom’s Franchise Model Is Putting Critical Infrastructure on the Chopping Block

    Terrorist Cyberattacks, UAE Cyber Security Council

    UAE Blocked AI-Powered Terrorist Cyberattacks Targeting Critical Infrastructure

    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    National Security Agency (NSA) appointment

    NSA Appoints Timothy Kosiba to Oversee Strategy and Cybersecurity Operations

    Shinhan Card data breach

    South Korea’s Shinhan Card Data Breach Affects 192,000 Merchants

    Cyble's Beenu-Recognized-by-ET-Edge-as-an-Impactful-CEO-2025_

    Beenu Arora, CEO & Co-Founder of Cyble, Recognized by ET Edge as an Impactful CEO 2025

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Cyber Essentials

UK, US, Australia Sanction Russian-Linked Evil Corp and LockBit Affiliates

Cyber and agencies have come together to expose the Russian cybercriminal empire. Sanctions, seizures and arrests galore.

Mihir Bagwe by Mihir Bagwe
July 9, 2025
in Cyber Essentials, Cyber News, Firewall Daily, Lockbit Ransomware News, Ransomware News, Threat Actors, Threat Intelligence
0
Dridex Malware, Sanctions, Global Sanctions, Russia, U.S., UK, NCA, FBI,
717
SHARES
4k
VIEWS
Share on LinkedInShare on Twitter

Cyber and law enforcement agencies from the U.K., U.S., and Australia have come together to expose the Russian cybercriminal empire of Evil Corp and its affiliation with the LockBit ransomware operators. Sanctions, seizures and arrests followed in at least eight announcements from the various agencies.

The joint international effort led to a fresh wave of sanctions against individuals associated with the notorious cybercrime group Evil Corp and exposed its affiliate ties to LockBit. Sixteen individuals have been sanctioned, including high-profile members with connections to Russian state entities and the ransomware group LockBit.

Evil Corp, long regarded as one of the most sophisticated cybercrime organizations, has seen its operations disrupted. However, the group’s criminal influence continues to reverberate across the globe, specifically through its role in developing ransomware strains like BitPaymer and its evolution to using LockBit ransomware.

A Deep-Rooted Cybercrime Legacy

Evil Corp’s history is intertwined with both financial crime and nation-state interests, according to an investigation led by the UK’s National Crime Agency (NCA). Initially a Moscow-based financial crime outfit, it later transformed into a full-fledged cybercrime syndicate, amassing over $300 million from healthcare, critical infrastructure, and government victims globally.

The group’s leader, Maksim Yakubets, and his close associate Igor Turashev, were indicted by the U.S. in 2019 for their role in orchestrating attacks using Dridex malware—a tool designed to steal banking credentials and deliver ransomware payloads.

Dridex Malware, Sanctions, Global Sanctions, Russia, U.S., UK, NCA, FBI,
Source: FBI

This week’s sanctions target an additional seven members – apart from the seven already indicted by the U.S. in 2019, including Yakubets’ father, Viktor Yakubets, and Aleksandr Ryzhenkov, a key figure behind LockBit ransomware.

report-ad-banner

Ryzhenkov has been identified as a pivotal operator responsible for some of the most damaging ransomware attacks facilitated by LockBit. He was also charged by the US Department of Justice for his role in deploying BitPaymer ransomware to extort American organizations.

Dmitriy Slobodskoy Maksim Yakubets Artem Yakubets Kirill Slobodskoy
Left to Right: Dmitriy Slobodskoy, Maksim Yakubets, Artem Yakubets, Kirill Slobodskoy (Source: NCA)

Evolving Tactics Amid Sanctions

In response to the 2019 sanctions, Evil Corp adjusted its methods, adopting tighter security measures and shifting from high-volume ransomware attacks to more targeted strikes against high-revenue businesses. This evolution allowed the group to continue its operations under the radar of law enforcement. The group was forced to innovate after its original tools, like BitPaymer and Dridex, became well-known and defendable by security systems.

Evil Corp Evolution, Evil Corp
Source: NCA

LockBit’s rise has offered former Evil Corp members a lucrative alternative. Developed under the ransomware-as-a-service model, LockBit allows cybercriminals to rent the ransomware infrastructure, which helps shield the creators from direct involvement in attacks. The connection between Evil Corp and LockBit shows the shifting trend in the cyber underworld—where major ransomware groups often cooperate, despite claims of separation.

The Global Pushback

The latest phase of Operation Cronos—an international law enforcement effort—continues to erode LockBit’s capabilities. France, Spain, and the UK coordinated a series of arrests targeting LockBit affiliates, including a developer and bulletproof hosting infrastructure facilitator. Those arrests, coupled with the seizure of nine key servers used by LockBit, mark a significant setback for the group.

In the last two years, LockBit has emerged as the most active ransomware group globally, targeting sectors ranging from finance to energy. Its infrastructure and attack model have been resilient, with law enforcement facing challenges in fully disrupting its operations. However, as the NCA tightens the noose around Evil Corp and its LockBit affiliates, the frequency and intensity of ransomware incidents have started to wane.

‘No More Ransom’ Initiative Gains Momentum

The takedown of ransomware groups is only one part of the global effort to combat cyber extortion. Europol, in collaboration with Japan’s cybersecurity teams, has advanced its efforts in developing decryption tools for ransomware victims. Over 6 million users have accessed these tools via the “No More Ransom” portal, saving billions in potential damages.

Europol also continues to provide critical support in tracing cryptocurrency transactions linked to ransomware operations. Through seven dedicated technical sprints, Europol has traced key financial exchanges, helping to identify LockBit and Evil Corp actors.

Strong Message from World Leaders

UK Foreign Secretary David Lammy emphasized the impact of these sanctions on Russia’s cybercriminal ecosystem. “Putin’s corrupt regime cannot continue its malign influence through criminal networks. Today’s action sends a strong message that we will use every tool at our disposal to stop cyber attacks against our allies.”

In Washington, the Treasury’s Office of Foreign Assets Control (OFAC) reiterated its commitment to safeguarding critical infrastructure against cyber threats. Acting Under Secretary Bradley T. Smith noted that the sanctions underscore collective international resolve to thwart ransomware actors. “Our coordinated efforts with the UK and Australia aim to dismantle the economic framework that allows these criminal groups to thrive.”

A Critical Turning Point?

While Evil Corp’s influence has diminished since 2019, its shadow still looms large over the global ransomware landscape. Investigators believe that many of its top operators continue to collaborate with other crime syndicates, creating complex webs of cybercriminal activity. LockBit’s developers have publicly distanced themselves from Evil Corp, but the sanctions and arrests suggest otherwise.

The arrest of a LockBit developer in France, along with the seizure of servers used to facilitate ransomware attacks, are signs that the walls are closing in on these criminal networks. Still, with ransomware being a multi-billion-dollar industry, it’s unlikely that either Evil Corp or LockBit will disappear overnight. Their evolution reflects the adaptability of cybercriminal organizations—a cat-and-mouse game where the stakes grow higher with each move.

Moving Forward

As cybersecurity practitioners and law enforcement agencies collaborate across borders, ransomware attackers are increasingly finding fewer places to hide. The collaborative efforts seen in Operation Cronos offer a glimpse into the future of cyber defense—where governments, private companies, and international organizations work in unison to thwart cybercrime at every level.

For CISOs, network engineers, and security practitioners, the takeaways from this operation are clear: ransomware is not just a technological threat, but a global geopolitical weapon. Preparing for these evolving threats requires not just technical defenses, but a deep understanding of the global cyber landscape.

This story will continue to evolve, as Operation Cronos and its counterparts say the operation is still ongoing.

Share this:

  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Reddit (Opens in new window) Reddit
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • More
  • Email a link to a friend (Opens in new window) Email
  • Share on WhatsApp (Opens in new window) WhatsApp

Related

Tags: Dridex Malwareevil corpFBIGlobal SanctionsLockbit AffiliatesNCARussiaSanctionsThe Cyber ExpressThe Cyber Express NewsU.S.UK
Previous Post

Iran-linked Threat Group Handala Actively Targets Israel

Next Post

One of the Largest Cybercriminal Operations in West Africa Dismantled

Next Post
Operation Contender, Interpol, Cybercrime, Romance Scam, Africa, West Africa, Operation Contender

One of the Largest Cybercriminal Operations in West Africa Dismantled

Threat Landscape Reports 2025

❮ ❯
Cyble-Vision


Follow Us On Google News

Latest Cyber News

Handala, Stryker Cyberattack, Iran Israel War
Cyber Warfare

Who Is Handala — The Iran-Linked Ghost Group That Just Wiped 200K Stryker Devices

March 12, 2026
Android phone vulnerability
Firewall Daily

Vulnerability in MediaTek Chips Could Impact 25% Android Smartphones

March 12, 2026
UIDAI Bug Bounty
Firewall Daily

India Introduces Bug Bounty Program to Target Gaps in Aadhaar Ecosystem

March 12, 2026
AI child safety in India
Cyber News

India Outlines Legal Framework to Protect Children from AI and Online Harm

March 12, 2026

Categories

Web Stories

Do This on Telegram, Your Bank Account Will Become Zero
Do This on Telegram, Your Bank Account Will Become Zero
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
Cricket World Cup Ticketing Systems Under Cybersecurity
Cricket World Cup Ticketing Systems Under Cybersecurity
Cyber Threats and Online Ticket Scams During the NBA Finals
Cyber Threats and Online Ticket Scams During the NBA Finals
Biometric Data Security: Protecting Sensitive Information
Biometric Data Security: Protecting Sensitive Information

About

The Cyber Express

#1 Trending Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

 

Quick Links

  • About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
10080 North Wolfe Road, Suite SW3-200, Cupertino, CA, US 95014

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
-
00:00
00:00

Queue

Update Required Flash plugin
-
00:00
00:00
Do This on Telegram, Your Bank Account Will Become Zero If You Install the iOS 18 Beta, Your iPhone Could Be Hacked Cricket World Cup Ticketing Systems Under Cybersecurity Cyber Threats and Online Ticket Scams During the NBA Finals Biometric Data Security: Protecting Sensitive Information