$100M Cyber Cartel Shocks Investigators

A cybercrime syndicate accused of stealing over $100 million has been described as operating like a cartel—complete with leadership, specialists, and a business-style structure built to outlast crackdowns.

Quick Take

  • Evil Corp has been linked in public reporting and U.S. government actions to more than $100 million in illicit proceeds across 40 countries.
  • Investigations describe a structured organization with specialized roles, money-moving facilitators, and Russia-based business entities used as operational cover.
  • The group’s shift from banking trojans to ransomware—and then to “ransomware-as-a-service”—shows how cybercriminals scale crime while distancing leaders from specific attacks.
  • U.S. sanctions announced in December 2019 created legal and compliance risks around paying ransoms tied to Evil Corp-linked infrastructure.

How Evil Corp Grew From Bank Fraud Into a Ransomware Machine

Security reporting traces Evil Corp to a Russia-based cybercrime cluster often associated with Indrik Spider, first widely identified for Dridex banking-trojan activity. Earlier campaigns used credential theft and account takeover to drain business accounts, with federal allegations describing Zeus-malware operations that stole more than $70 million from victims across multiple U.S. states and attempted far more. That pipeline—phishing, credential theft, and cash-out—set the foundation for later extortion-based ransomware operations.

By 2017, the group’s tradecraft had shifted toward ransomware, aligning with a broader criminal trend: lock systems, demand payment, and pressure victims with downtime. Reporting describes initial access techniques that included fake software updates and post-compromise tools for lateral movement before encryption. After the 2017-era ransomware campaigns, subsequent strains and tooling changes appeared as defenders and governments improved detection. The throughline stayed consistent: professionalized operations built for repeatable revenue, not one-off hacks.

A “Business” Model That Mirrors Organized Crime Structures

U.S. government-focused analysis has described Evil Corp as operating “as a business,” with a physical office presence in Moscow and defined responsibilities across members. That matters because it points to durability: specialization allows a criminal enterprise to replace parts without collapsing the whole. Public descriptions also reference money laundering facilitators and Russia-based business entities that can provide cover, payments infrastructure, and a buffer between operators and proceeds—similar to how traditional syndicates compartmentalize risk.

The organization’s structure also helps explain scale. Public reporting tied to sanctions and investigations has cited more than $100 million in proceeds and victims across roughly 40 countries, a footprint that exceeds what most small ransomware crews can manage. At that level, operational discipline becomes a force multiplier: standardized playbooks, dedicated roles, and repeatable intrusion paths. For American businesses, the practical takeaway is blunt—this is not random “teen hacking,” but sustained transnational crime built to monetize U.S. openness.

Sanctions, Ransom Payments, and the Compliance Trap for Victims

In December 2019, U.S. authorities announced sanctions targeting individuals and entities tied to Evil Corp, an approach designed to squeeze the group’s ability to move money and operate openly. For U.S. companies and insurers, sanctions raise a second crisis on top of the cyberattack itself: paying a ransom can create legal exposure if the recipient is a sanctioned party or is linked to sanctioned infrastructure. That dynamic pushes victims toward restoration and resilience instead of quick payoffs.

Sanctions also triggered adaptation. Reporting describes the group rotating tools and malware families, abandoning older components, and cycling through different ransomware variants in ways that complicate attribution. That “shape-shifting” approach matters for defenders because many organizations still rely on checkbox security and vendor promises rather than hardening basics: patching, privileged-access control, segmented networks, and tested offline backups. When criminals pivot faster than bureaucracies, victims become the ones paying—either in ransom, downtime, or both.

Ransomware-as-a-Service: Scaling Crime While Masking Responsibility

Post-2020 reporting describes Evil Corp moving toward a ransomware-as-a-service model, where affiliates can use shared infrastructure or tooling while the core group profits through fees or revenue splits. That approach expands reach without expanding the core team, while giving leadership plausible distance from specific intrusions. It also muddies headlines: an “Evil Corp-style” incident may involve affiliates using a platform rather than direct involvement by known operators, limiting what public data can prove in real time.

For ordinary Americans and small businesses, the policy lesson is straightforward: cybercrime is now organized, international, and structurally similar to old-school rackets—except the border is your inbox. The research available here does not provide real-time confirmation of current 2026 operations, but it does show a decade-long pattern of adaptation and scaling. A constitutional, limited-government approach still applies: focus on deterrence, enforcement, and hardened targets, not new bureaucracies that punish lawful citizens.

Sources:

https://ironscales.com/blog/ransomware-gangs-evil-corp
https://www.lawfaremedia.org/article/transnational-organized-crime-and-national-security-evil-corp-hezbollah-and-chinese-opioid
https://www.darktrace.com/blog/countering-the-cartel-darktraces-investigation-into-cybercartel-attacks-targeting-latin-america
https://www.bitdefender.com/en-us/blog/businessinsights/dragonforce-ransomware-cartel
https://www.ranenetwork.com/blog/network-intelligence-report-the-rapid-evolution-of-transnational-crime-and-its-impact-on-organizations
https://www.contrastsecurity.com/video/the-evolution-of-cybercrime-cartels
https://falconfeeds.io/blogs/cyber-cartels-digital-havens-criminal-alliances-cybersecurity
https://www.adaptiveoffice.ca/blog/cyber-attacks-are-more-profitable-than-the-drug-trade/
https://flare.io/learn/resources/blog/33197