Sanctions Finder
  • Search
  • Tracker
  • Features
  • FAQ
  • Insights
  • About Us
  • Support Us
Sanctions Finder
  1. Search
  2. Results
  3. Personal Information
Individual

Last Updated: April 19, 2026

  1. Search
  2. Results
  3. Personal Information

Last Updated: April 19, 2026

Individual

Maksim Viktorovich YAKUBETS

Aliases

AQUA

DoB

1987-05-20

Address

Moscow, Russia

Reg. ID

4509135586, Passport

Official reason

Yakubets was involved in the installation of malicious software known as Zeus, which was disseminated through phishing emails and used to capture victims’ online banking credentials. These credentials were then used to steal money from the victims’ bank accounts. On August 22, 2012, an individual was charged in a superseding indictment under the moniker “aqua” in the District of Nebraska with conspiracy to participate in racketeering activity, conspiracy to commit computer fraud and identity theft, aggravated identity theft, and multiple counts of bank fraud. On November 14, 2019, a criminal complaint was issued in the District of Nebraska that ties the previously indicted moniker of “aqua” to Yakubets and charges him with conspiracy to commit bank fraud. Yakubets is also allegedly the leader of the Bugat/Cridex/Dridex malware conspiracy wherein he oversaw and managed the development, maintenance, distribution, and infection of the malware. Yakubets allegedly conspired to disseminate the malware through phishing emails, to use the malware to capture online banking credentials, and to use these captured credentials to steal money from the victims’ bank accounts. He, subsequently, used the malware to install ransomware on victims’ computers. Yakubets was indicted in the Western District of Pennsylvania, on November 13, 2019, and was charged with Conspiracy, Conspiracy to Commit Fraud, Wire Fraud, Bank Fraud, and Intentional Damage to a Computer.

Other Information

https://www.state.gov/transnational-organized-crime-rewards-program-2/maksim-viktorovich-yakubets/

Date of listing

2019-12-05

Program information
Program information
Authority

US

Program

Executive Order 13694 Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities; Executive Order 13757 Taking Additional Steps to Address the National Emergency With Respect to Significant Malicious Cyber-Enabled Activities

Regime

OFAC-horizontal

Target State

Cyber-attacks

Measures

Blocking Property, Suspending Entry

Sanctions Portfolio

• https://ofac.treasury.gov/faqs/topic/1546

Official Information

On December 31, 2015, OFAC issued the Cyber-Related Sanctions Regulations, 31 CFR part 578 (80 FR 81752, December 31, 2015) (the “Regulations”) to implement Executive Order (E.O.) 13694 of April 1, 2015, “Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities” (80 FR 18077, April 2, 2015), pursuant to authorities delegated to the Secretary of the Treasury in E.O. 13694. The Regulations were initially issued in abbreviated form for the purpose of providing immediate guidance to the public. OFAC is revising the Regulations to further implement E.O. 13694, as amended by E.O. 13757 of December 28, 2016, “Taking Additional Steps to Address the National Emergency With Respect to Significant Malicious Cyber-Enabled Activities” (82 FR 1, January 3, 2017), as well as certain provisions of title II of the Countering America's Adversaries Through Sanctions Act (Pub. L. 115–44, 131 Stat. 886 (codified in scattered sections of 22 U.S.C.)) (CAATSA). OFAC is amending and reissuing the Regulations as a more comprehensive set of regulations that includes additional interpretive guidance and definitions, general licenses, and other regulatory provisions that will provide further guidance to the public. Due to the number of regulatory sections being updated or added, OFAC is reissuing the Regulations in their entirety. E.O. 13694, as Amended by E.O. 13757. On April 1, 2015, the President, invoking the authority of, inter alia, the International Emergency Economic Powers Act (50 U.S.C. 1701 et seq.) (IEEPA), issued E.O. 13694. In E.O. 13694, the President determined that the increasing prevalence and severity of malicious cyber-enabled activities originating from, or directed by persons located, in whole or in substantial part, outside the United States constitute an unusual and extraordinary threat to the national security, foreign policy, and economy of the United States, and declared a national emergency to deal with that threat. On December 28, 2016, the President issued E.O. 13757 to take additional steps to deal with the national emergency with respect to significant malicious cyber-enabled activities declared in E.O. 13694. E.O. 13757 added an Annex to E.O. 13694 and amended section 1 of E.O. 13694 by replacing section 1(a) in its entirety.

Additional Details

SDN

Program URL
  • https://www.federalregister.gov/documents/2022/09/06/2022-19138/cyber-related-sanctions-regulations

Have feedback, suggestions or need help navigating sanctions? Let's talk.

Let's discuss how Sanctions Finder can support you or your business or organization.

Product

  • Search
  • Sanctions Tracker
  • Platform Features

Company

  • About Sanctions Finder
  • Insights

Support

  • FAQ
  • Contact Us

Legal

  • Terms of Use
  • Privacy Policy
XLinkedInContact Us

Copyright @ 2024 Sanctions Finder