CrimeOwl AI logoCrimeOwl AI
CasesBlogPricingAbout
  1. Home
  2. /
  3. Cases
  4. /
  5. MAKSIM VIKTOROVICH YAKUBETS
Back to CasesMore Cases
Tens of thousands of computer users in North America and Europe; multiple financial institutions

The person at the center of this case

Tens of thousands of computer users in North America and Europe; multiple financial institutions

Case
#927
SourceFBI WantedUpdated Mar 15, 2026
North America and Europe
Federal Bureau of Investigation (FBI); U.S. District Court for the District of Nebraska; U.S. District Court for the Western District of Pennsylvania
Cold Case · Open
13 years waiting · since 2012

MAKSIM VIKTOROVICH YAKUBETS

Justice for Tens of thousands of computer users in North America and Europe; multiple financial institutions — the trail went cold in 2012, but the truth hasn't.

Start here

Key leads to think about

🎯
suspect
Lead #1

What is Yakubets' current location and how has he evaded capture since 2012?

🔍
evidence
Lead #2

How were the Zeus malware variants technically distributed and what infrastructure supported the operation?

💡
clue
Lead #3

Are there connections between Yakubets and other known cybercriminal organizations or state-sponsored actors?

Maksim Viktorovich Yakubets is wanted for leading a sophisticated cybercrime operation that deployed the Zeus malware to infect tens of thousands of computers across North America and Europe, stealing tens of millions of dollars through compromised banking credentials. Operating under the online alias 'aqua,' Yakubets orchestrated the development, distribution, and deployment of malware variants including Bugat, Cridex, and Dridex to capture victims' online banking information and facilitate theft from their accounts. Despite indictments issued in 2012 and 2019 in Nebraska and Pennsylvania, Yakubets remains at large, and his capture could dismantle a major cybercriminal enterprise and prevent ongoing financial harm to potential victims.

Case
#927
SourceFBI WantedUpdated Mar 15, 2026
North America and Europe
Federal Bureau of Investigation (FBI); U.S. District Court for the District of Nebraska; U.S. District Court for the Western District of Pennsylvania

Try asking

Claim this imported case

A one-time $10 claim transfers this imported case workspace to your account. You get 10 uploads for this case, 25 daily AI questions for this case, and public tips with files route to you.

10 uploads25 AI questions/day

This does not start a subscription. When the included limits are reached, the Personal plan unlocks more workspace capacity.

More leads to consider

Beyond the top three above — each detail below could be the thread that pulls this case open.

📞
contact
Lead #4

Who are the key associates and co-conspirators in the Bugat/Cridex/Dridex malware conspiracy?

Have information about any of these leads?

Even the smallest detail could be the key to solving this case.

Official wording

Source Narrative

Conspiracy; Conspiracy to Commit Fraud; Wire Fraud; Bank Fraud; Intentional Damage to a Computer Caution: Maksim Viktorovich Yakubets is wanted for his involvement with computer malware that infected tens of thousands of computers in both North America and Europe, resulting in actual financial losses in the tens of millions of dollars. Specifically, Yakubets was involved in the installation of malicious software known as "Zeus", which was disseminated through phishing emails and used to capture victims’ online banking credentials.

These credentials were then used to steal money from the victims' bank accounts. On August 22, 2012, an individual was charged in a superseding indictment under the moniker “aqua” in the District of Nebraska with conspiracy to participate in racketeering activity, conspiracy to commit computer fraud and identity theft, aggravated identity theft, and multiple counts of bank fraud.

On November 14, 2019, a criminal complaint was issued in the District of Nebraska that ties the previously indicted moniker of “aqua” to Yakubets and charges him with conspiracy to commit bank fraud. Yakubets is also allegedly the leader of the Bugat/Cridex/Dridex malware conspiracy wherein he oversaw and managed the development, maintenance, distribution, and infection of the malware.

Yakubets allegedly conspired to disseminate the malware through phishing emails, to use the malware to capture online banking credentials, and to use these captured credentials to steal money from the victims’ bank accounts. He, subsequently, used the malware to install ransomware on victims’ computers.

Yakubets was indicted in the Western District of Pennsylvania, on November 13, 2019, and was charged with Conspiracy, Conspiracy to Commit Fraud, Wire Fraud, Bank Fraud, and Intentional Damage to a Computer.

Timeline of Events

🕵️
2012-08-22

Indictment issued under alias 'aqua'

Individual charged in the District of Nebraska with conspiracy to participate in racketeering activity, conspiracy to commit computer fraud and identity theft, aggravated identity theft, and multiple counts of bank fraud

🕵️
2019-11-13

Indictment in Western District of Pennsylvania

Yakubets indicted and charged with Conspiracy, Conspiracy to Commit Fraud, Wire Fraud, Bank Fraud, and Intentional Damage to a Computer

🕵️
2019-11-14

Criminal complaint issued

Criminal complaint in the District of Nebraska ties the 'aqua' moniker to Maksim Viktorovich Yakubets and charges him with conspiracy to commit bank fraud

Case Information

Incident:August 22, 2012
Last Updated:April 29, 2026

Up to $5 Reward

For information leading to the resolution of this case

Leave a comment

Comments

Case Information

Incident:August 22, 2012
Last Updated:April 29, 2026

Up to $5 Reward

For information leading to the resolution of this case