Friday, April 11, 2025
HomeCyber AttackEvilCorp and RansomHub Collaborate to Launch Worldwide Attacks on Organizations

EvilCorp and RansomHub Collaborate to Launch Worldwide Attacks on Organizations

Published on

SIEM as a Service

Follow Us on Google News

EvilCorp, a sanctioned Russia-based cybercriminal enterprise, has been observed collaborating with RansomHub, one of the most active ransomware-as-a-service (RaaS) operations.

This partnership has heightened the threat landscape, as both entities leverage advanced tools and techniques to target organizations across the globe.

EvilCorp: A History of Cybercrime

EvilCorp, led by Maksim Yakubets, has long been notorious for its large-scale financial cyberattacks.

- Advertisement - Google News

Initially known for deploying the Dridex banking trojan, the group expanded its operations to include ransomware families such as BitPaymer, WastedLocker, and PhoenixLocker.

Despite being under U.S. sanctions since 2019, EvilCorp has continued its activities by adapting its tactics and affiliating with other RaaS operations like LockBit and now RansomHub.

The group’s connections to Russian intelligence agencies further complicate enforcement efforts.

Yakubets’ father-in-law, Eduard Bendersky a former FSB officer is suspected of shielding EvilCorp from prosecution in Russia.

EvilCorp’s use of SocGholish malware (also known as FAKEUPDATES), which masquerades as legitimate browser updates to gain initial access to systems, remains a key indicator of its involvement in ransomware attacks.

Worldwide Attacks
Attack Lifecycle

RansomHub: The Rising Star in RaaS Operations

Active since February 2024, RansomHub has quickly become one of the most widespread ransomware families after absorbing affiliates from defunct operations like BlackCat/ALPHV and LockBit.

Known for its versatility, RansomHub affiliates employ diverse tools and techniques to achieve their objectives of data exfiltration and ransomware deployment.

The operation’s prominence has attracted ex-affiliates from other major ransomware groups, further consolidating its position in the cybercrime ecosystem.

Recent reports highlight RansomHub’s use of Python-based backdoors such as VIPERTUNNEL, often delivered via SocGholish infections a tactic closely associated with EvilCorp.

According to the Report, this overlap in tools and techniques underscores the growing collaboration between these two entities

The partnership between EvilCorp and RansomHub is a significant concern for cybersecurity defenders and law enforcement agencies alike.

EvilCorp’s expertise in financial cybercrime combined with RansomHub’s expansive affiliate network creates a formidable threat capable of launching sophisticated attacks on organizations worldwide.

From a legal perspective, this collaboration raises new challenges. Organizations affected by ransomware attacks linked to EvilCorp face potential fines if they pay ransoms due to U.S. sanctions imposed by the Office of Foreign Assets Control (OFAC).

With RansomHub now affiliated with EvilCorp, victims may inadvertently violate these sanctions, complicating ransomware negotiations and cyber insurance claims.

Moreover, cybersecurity analysts predict that this association could lead to increased scrutiny of RansomHub by international law enforcement agencies.

Potential sanctions or takedowns targeting RansomHub could disrupt its operations but may also prompt rebranding efforts, a common tactic among ransomware groups seeking to evade detection and maintain profitability.

The collaboration between EvilCorp and RansomHub exemplifies the evolving tactics employed by cybercriminals to maximize their impact while evading enforcement actions.

As these groups continue to adapt and innovate, cybersecurity defenders must remain vigilant in monitoring emerging threats and developing proactive strategies to mitigate risks.

Organizations are advised to strengthen their defenses against known tactics such as SocGholish malware infections and Python-based backdoors while staying informed about developments in the ransomware ecosystem.

Enhanced threat intelligence sharing among industry stakeholders will be critical in countering the growing menace posed by this partnership.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Calix Devices Vulnerable to Pre-Auth RCE on Port 6998, Root Access Possible

A severe security flaw enabling unauthenticated remote code execution (RCE) with root privileges has...

Microsoft Boosts Exchange and SharePoint Security with Updated Antimalware Scan

Microsoft has fortified its Exchange Server and SharePoint Server security by integrating advanced Antimalware...

AMD CPU Signature Verification Vulnerability Enables Unauthorized Microcode Execution

A vulnerability in AMD CPUs has been uncovered, enabling attackers with administrative privileges to...

Researchers Exploit Windows Defender with XOR and System Calls

A recent cybersecurity revelation has demonstrated how researchers successfully bypassed Windows Defender antivirus mechanisms...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Calix Devices Vulnerable to Pre-Auth RCE on Port 6998, Root Access Possible

A severe security flaw enabling unauthenticated remote code execution (RCE) with root privileges has...

Microsoft Boosts Exchange and SharePoint Security with Updated Antimalware Scan

Microsoft has fortified its Exchange Server and SharePoint Server security by integrating advanced Antimalware...

AMD CPU Signature Verification Vulnerability Enables Unauthorized Microcode Execution

A vulnerability in AMD CPUs has been uncovered, enabling attackers with administrative privileges to...