• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

'Blue Locker' Ransomware Targeting Oil & Gas Sector in Pakistan

 | 

Hackers exploit Microsoft flaw to breach Canada ’s House of Commons

 | 

Norway confirms dam intrusion by Pro-Russian hackers

 | 

Zoom patches critical Windows flaw allowing privilege escalation

 | 

Manpower data breach impacted 144,180 individuals

 | 

U.S. CISA adds Microsoft Internet Explorer, Microsoft Office Excel, and WinRAR flaws to its Known Exploited Vulnerabilities catalog

 | 

Critical FortiSIEM flaw under active exploitation, Fortinet warns

 | 

Charon Ransomware targets Middle East with APT attack methods

 | 

Hackers leak 2.8M sensitive records from Allianz Life in Salesforce data breach

 | 

SAP fixed 26 flaws in August 2025 Update, including 4 Critical

 | 

August 2025 Patch Tuesday fixes a Windows Kerberos Zero-Day

 | 

Dutch NCSC: Citrix NetScaler zero-day breaches critical orgs

 | 

Chrome sandbox escape nets security researcher $250,000 reward

 | 

Smart Buses flaws expose vehicles to tracking, control, and spying

 | 

MedusaLocker ransomware group is looking for pentesters

 | 

Google confirms Salesforce CRM breach, faces extortion threat

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 57

 | 

Security Affairs newsletter Round 536 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Embargo Ransomware nets $34.2M in crypto since April 2024

 | 

Germany limits police spyware use to serious crimes

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Cyber Crime
  • Hacking
  • Malware
  • Security
  • Crazy Evil gang runs over 10 highly specialized social media scams

Crazy Evil gang runs over 10 highly specialized social media scams

Pierluigi Paganini February 03, 2025

The Russian-speaking Crazy Evil group runs over 10 social media scams, tricking victims into installing StealC, AMOS, and Angel Drainer malware.

Since 2021, the Crazy Evil gang has become a major cybercriminal group, using phishing, identity fraud, and malware to steal cryptocurrency.

Security experts identified six Crazy Evil’s subteams, called AVLAND, TYPED, DELAND, ZOOMLAND, DEFI, and KEVLAND, which are running targeted scams for specific victim profiles.

The leader of the group is a threat actor known on Telegram as “Abrahamˮ @AbrahamCrazyEvil.

The group’s arsenal includes multiple malware strains including the Stealc and the AMOS infostealer for Windows and macOS.

“Insikt Group has found over ten active scams, including Voxium and Rocket Galaxy, leveraging tailored lures to deceive victims.” reads the report published by Insikt Group. “Targeting of Cryptocurrency Users and Influencers: Crazy Evil explicitly victimizes the cryptocurrency space with bespoke spearphishing lures.”

Crazy Evil is referred as a “traffer team,ˮ which is a group of social engineering specialists tasked with redirecting legitimate traffic to malicious landing pages.

The gang targets high-value victims, also called “mammoths,” for digital asset theft, including cryptocurrencies, payment cards, online banking accounts, and non-fungible tokens (NFTs). Active since 2021, the group amassed over 3,000 followers on its public Telegram CrazyEvilCorp channel. As of December 2, 2024, the fraudulent operations linked to Crazy Evil are still active.

Crazy Evil has earned over $5 million through phishing scams since 2021. Victim losses range from $0.10 to over $100,000, relying on luck and persistence.

Crazy Evil actively recruits affiliates by advertising its cybercriminal network with specific skill requirements. Applicants must be proficient in operating fully undetectable (FUD) infostealers for both Windows and macOS, as well as manipulating hardware cryptocurrency wallets through tactics like address poisoning. Applicants must be able to target Ledger and Trezor devices. Additionally, recruits should have experience working with various FUD exploits, though details on these techniques are vague.

Expertise in deploying cryptocurrency wallet drainers and setting up phishing landing pages is also highly valued. To accommodate inexperienced cybercriminals, Crazy Evil provides training materials and assigns newcomers to experienced mentors (aka “curators”) who guide them through the group’s illicit operations. This structured approach demonstrates the gang’s effort to maintain a well-trained and efficient network of traffers.

Crazy Evil

The cybercrime gang focused on targeting the Web3 and decentralized finance industry. The group maintains a strong presence on dark web forums and collaborates with other cybercrime gangs and malware developers. These factors make it a persistent cyber threat.

However, like many cybercriminal groups, its biggest vulnerability is internal conflict. As it grows in size and complexity, the risk of exit scams and splintering, seen in past groups.

“Threat groups like Crazy Evil are resilient to identification and disruption — the biggest threat to their operations comes from internal strife. When threat groups like Crazy Evil increase in membership and expand operations, exit scamming and splintering are more likely to be their downfall, as seen with Marko Polo and CryptoLove.” concludes the report that includes the Indicators of Compromise (IoCs).

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, cybercrime)


facebook linkedin twitter

Crazy Evil Cybercrime Hacking hacking news information security news IT Information Security malware phishing Pierluigi Paganini Security Affairs Security News

you might also like

Pierluigi Paganini August 15, 2025
'Blue Locker' Ransomware Targeting Oil & Gas Sector in Pakistan
Read more
Pierluigi Paganini August 15, 2025
Hackers exploit Microsoft flaw to breach Canada ’s House of Commons
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    'Blue Locker' Ransomware Targeting Oil & Gas Sector in Pakistan

    Malware / August 15, 2025

    Hackers exploit Microsoft flaw to breach Canada ’s House of Commons

    Hacking / August 15, 2025

    Norway confirms dam intrusion by Pro-Russian hackers

    Hacktivism / August 14, 2025

    Zoom patches critical Windows flaw allowing privilege escalation

    Security / August 14, 2025

    Manpower data breach impacted 144,180 individuals

    Cyber Crime / August 14, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT