INSUBCONTINENT EXCLUSIVE:
A tight-knit family of hackers and intelligence operatives was the driving force behind Russia's "Evil Corp" cybercrime syndicate,
sanctions leveled by London, Washington and Canberra have revealed.Once considered the "most significant cybercrime threat in the world,"
Evil Corp has been credited with spying on NATO allies at the behest of Russia's intelligence services.It has also used phishing scams to
pilfer more than $100 million from a string of companies across dozens of countries, according to a 2019 US indictment.Financial sanctions
rolled out by the United Kingdom, the United States and Australia jointly target Evil Corp figures such as Maksim Yakubets, the leader of
the hacking group.But the sanctions also shed light on the tight-knit nature of the group's operations, detailing a family tree that
cyber-criminal ecosystem," UK Foreign Secretary David Lammy said.Australian Foreign Minister Penny Wong added: "We are using all elements of
our national power to make Australia more secure and to keep Australians safe."Additionally, all three nations leveled sanctions against
Aleksandr Ryzhenkov, a previously unknown hacker who the UK's National Crime Agency linked to the prolific LockBit ransomware
group.LockBit was one of the major developers of malicious software that allows criminals to lock victims out of their networks, steal their
data and demand a ransom for its return