Western authorities have named Russian national Aleksandr Ryzhenkov as a leading member of the notorious Evil Corp cybercrime group and identified him as an affiliate of the infamous LockBit ransomware gang. This announcement comes alongside a series of high-profile arrests across several countries, marking a significant development in the ongoing battle against global cybercrime.
Ryzhenkov has been charged by the U.S. Department of Justice with deploying BitPaymer ransomware to extort victim businesses throughout the United States. According to Nicole Argentieri, head of the DOJ’s Criminal Division, “Aleksandr Ryzhenkov encrypted confidential business information, holding it for ransom and crippling companies until payment was made.” This form of ransomware attack has become a scourge on global businesses, with companies losing billions in ransom payments and recovery costs.
Authorities in the United Kingdom and Australia have also joined the U.S. in identifying Ryzhenkov as a key player in Evil Corp, a criminal organization deeply embedded in Russia’s cyber landscape. His work, alongside former Russian intelligence officer Eduard Benderskiy, has enabled Evil Corp to evade Russian law enforcement while continuing to wreak havoc on businesses worldwide. Benderskiy is believed to provide protection to these cybercriminals, shielding them from Russian authorities and allowing them to operate with relative impunity.
The coordinated effort to disrupt these criminal organizations extends beyond just Ryzhenkov. Several arrests have been made in connection to the LockBit operation, including two suspected money launderers in the United Kingdom, a suspected LockBit developer in France, and the owner of a “bulletproof hosting” company in Spain. These arrests represent a broader strategy to cripple the infrastructure that supports ransomware groups and their illicit activities.
“The coordinated actions announced today demonstrate, yet again, that the Justice Department is committed to working with its partners to take an all-tools approach to protecting victims and holding cybercriminals accountable,” said Argentieri.
As part of the crackdown, the U.S., U.K., and Australia have expanded their financial sanctions lists, adding a host of individuals connected to Evil Corp. The U.K. alone has listed 16 new individuals, 15 of whom are associated with Evil Corp, while the U.S. Treasury has designated seven individuals and two entities, and Australia has sanctioned three individuals. These sanctions aim to disrupt the financial operations of these cybercriminals, cutting off their access to funds and resources.
Bradley Smith of the U.S. Treasury emphasized the importance of this trilateral action, stating, “Today’s collective commitment underscores our resolve to safeguard against cybercriminals like ransomware actors, who threaten our critical infrastructure and the security of our citizens.”
The LockBit ransomware gang, which has been a dominant force in the cybercrime world, suffered a major blow earlier this year when law enforcement seized its infrastructure. While the group is still operational, officials believe that its capacity has been dramatically reduced, with some of its most skilled affiliates now opting for alternative platforms. Recent revelations suggest that many of the so-called “victims” listed on LockBit’s darknet site are either old compromises or fabricated incidents designed to inflate the group’s current activity.
One of the more shocking discoveries was that LockBit did not, in fact, delete victim data as promised, despite claiming to do so after ransom payments were made. Instead, the gang retained the data for further exploitation, deceiving both victims and affiliates. This revelation came from an analysis of the source code used in LockBit’s system, which was designed to offer the group a backdoor to the encrypted data.
In a particularly significant revelation in May of this year, the National Crime Agency (NCA) in the U.K. identified the leader of LockBit as 31-year-old Russian national Dmitry Khoroshev. Khoroshev has been charged with numerous offenses, including growing LockBit into “one of the most prolific and destructive ransomware organizations in the world.”
James Babbage, the NCA’s director general for threats, hailed the latest operation as a key victory against cybercrime. “These sanctions expose further members of Evil Corp, including one who was a LockBit affiliate, and those who were critical to enabling their activity,” Babbage stated. He noted that since the U.S. first took action against Evil Corp in 2019, the group’s tactics have shifted, reducing their overall harm but still posing a significant threat.
Babbage further emphasized the NCA’s commitment to tackling the global ransomware threat, stating, “Ransomware is the most significant cybercrime threat facing the UK and the world. The NCA is dedicated to working with our partners in the UK and overseas, sharing intelligence and working to disrupt the most sophisticated and harmful ransomware groups, no matter where they are or how long it takes.”
This international effort to dismantle Evil Corp and LockBit represents a significant step forward in the fight against cybercrime, but the battle is far from over. As cybercriminals continue to evolve their methods, law enforcement agencies must remain vigilant, adapting their strategies to counter these ever-growing threats.
The impact of ransomware attacks goes beyond financial losses; they threaten national security, disrupt essential services, and create a sense of instability. The arrests and sanctions announced this week are a testament to the resilience of global law enforcement, demonstrating that cybercriminals, no matter how elusive, will be held accountable.
With these groups under increasing pressure, the global cybercrime landscape may begin to shift. But as history has shown, new threats are likely to emerge, and the need for international cooperation and intelligence sharing will remain crucial in safeguarding businesses and citizens alike.


