
Crazy Evil subteam clustering referenced in this report Source: Recorded Future)
The Insikt Group has uncovered the operations of a prolific Russian-speaking cybercriminal group, named Crazy Evil, which has been wreaking havoc on cryptocurrency enthusiasts, influencers, and decentralized finance (DeFi) ecosystems worldwide. Operating under the “traffer team” model, Crazy Evil utilizes highly sophisticated social engineering tactics, malware, and phishing scams to compromise tens of thousands of devices globally, amassing millions in illicit revenue.
Crazy Evil has been active since 2021, targeting high-value victims known as “mammoths” through spear-phishing lures and deceptive landing pages. According to the Insikt Group, the gang “leverages a diverse malware toolkit used in highprofile attacks — affecting both Windows and macOS.” This cross-platform capability enables widespread attacks across industries, including cryptocurrency, gaming, and online banking.
The gang operates on platforms like Telegram, with over 3,000 followers on its public channel and six subteams executing unique scams. High-profile campaigns include Voxium, TyperDex, and Gatherum, which lure victims into downloading infostealer malware under the guise of legitimate applications.
Crazy Evil’s scams are multi-faceted and meticulously planned. The Voxium campaign, for instance, masquerades as a decentralized communication tool. Victims are tricked into entering “meeting codes” on fake websites, which then deliver malware disguised as legitimate installers. Similarly, the TyperDex scam employs SEO poisoning to draw victims to its landing pages, targeting cryptocurrency wallets and personal data.
“Time is the most valuable resource,” a Crazy Evil manual emphasizes, encouraging quick-turnaround attacks on less tech-savvy victims.
Since its inception, Crazy Evil has compromised tens of thousands of devices globally. The gang’s private Telegram channels, such as “Payments” and “Logbar,” detail stolen data, including IP addresses, geographical locations, passwords, and cryptocurrency wallet information. Single attacks have reportedly resulted in losses exceeding $100,000.
“The threat groups ability to operate on such a large scale poses a serious risk to both personal data security and the overall stability of the Web3 ecosystem,” the report notes.
Crazy Evil employs advanced techniques to remain undetected, including:
- Obfuscation: Malware is heavily obfuscated, making it difficult to analyze and detect.
- Cross-platform targeting: The use of tools like Atomic macOS Stealer (AMOS) ensures compatibility across macOS and Windows environments.
- Use of legitimate services: Domains hosted on Cloudflare and Dropbox are exploited to deliver malicious payloads, complicating traditional blocklist-based defenses.
As decentralized technologies grow in popularity, cybercriminal groups like Crazy Evil are poised to exploit their vulnerabilities further. “The rise of Web3 technologies and decentralized finance will fundamentally transform the global cybersecurity landscape,” the report warns. Organizations and individuals in the DeFi ecosystem must remain vigilant as these threats continue to evolve.
Related Posts:
- Evil Ant Ransomware Exposed: Flaw Offers Recovery Hope
- Evil Corp Cybercriminals Exposed: UK Sanctions 16 Individuals Linked to Russian State and LockBit
- CISA warns of MinIO privilege escalation flaw exploited in attacks
- OWASP Unveils Top 10 Smart Contract Vulnerabilities for 2025