HomeMalware & ThreatsBKA Identifies REvil Leaders Responsible for 130 Ransomware Attacks in Germany

BKA Identifies REvil Leaders Responsible for 130 Ransomware Attacks in Germany

Published on

spot_img

German Authorities Expose Key Figures Behind REvil Ransomware Operation

The Federal Criminal Police Office of Germany, known as the BKA (Bundeskriminalamt), has unveiled the true identities of two central figures linked to the now-defunct REvil (also referred to as Sodinokibi) ransomware-as-a-service (RaaS) operation, a notorious threat that has wreaked havoc on organizations worldwide.

In a significant move to enhance cybersecurity and bring cybercriminals to justice, authorities identified one of the key perpetrators, an individual operating under the pseudonym "UNKN." This individual was a prominent figure within the group, actively promoting the ransomware on the XSS cybercrime forum as early as June 2019. His real name is Daniil Maksimovich Shchukin, a 31-year-old national from Russia. Shchukin is known to have operated under several aliases, including Oneiilk2, Oneillk2, Oneillk22, and GandCrab.

The revelation occurred through meticulous investigative efforts by the BKA and was first reported by renowned security journalist Brian Krebs. The BKA noted that Shchukin was a leading figure in one of the most significant global ransomware groups, GandCrab/REvil, from early 2019 until at least July 2021. During this time, he collaborated with a network of criminals, employing sophisticated techniques to demand exorbitant ransom payments from victims, threatening to leak sensitive data if their financial demands were not met.

In addition, the BKA has included another critical player on its wanted list: Anatoly Sergeevitsch Kravchuk, a 43-year-old Russian, originally from the Ukrainian city of Makiivka. Allegations indicate that Kravchuk played a vital role in the development of REvil during the same timeline, underscoring the collaborative nature of the operation.

The BKA’s investigations reveal that Shchukin and Kravchuk are implicated in 130 ransomware attacks across Germany. Of these incidents, 25 resulted in actual ransom payments totaling €1.9 million (approximately $2.19 million). Collectively, these attacks incurred staggering financial damages exceeding €35.4 million (about $40.8 million), showcasing the extensive impact of their cybercriminal activities.

REvil, also known as Water Mare and Gold Southfield, emerged as one of the most prolific ransomware groups in recent years, targeting high-profile organizations such as JBS, a major meat processing company, and Kaseya, an IT management provider. The group evolved from the earlier GandCrab ransomware and was notorious for its aggressive tactics and the scale of its operations.

Interestingly, REvil’s activities showed signs of abrupt changes. In mid-July 2021, the group mysteriously went offline, leaving many in the cybersecurity community puzzled. It would resurface two months later, only to cease operations entirely by October 2021 when its data leak site became non-functional due to a concerted law enforcement effort.

Subsequent to the shutdown of operations in 2021, Romanian authorities arrested two individuals involved in the REvil group’s affiliate network, highlighting the ongoing international push to dismantle this cybercriminal organization. In a move that raised eyebrows across the global security community, Russia’s Federal Security Service (FSB) announced in January 2022 that a number of REvil gang members had been arrested, effectively neutralizing the group’s operations. Four of those apprehended received prison sentences in October 2024, as reported by the Russian news outlet Kommersant.

Notably, Shchukin’s disappearance from cybercrime forums synchronized with the law enforcement crackdown, leading to another figure, REvil (later rebranded as 0_neday), taking the helm as the public face of the gang’s operations.

In an earlier interview with Dmitry Smilyanets from Recorded Future in March 2021, Shchukin recounted his challenging upbringing, stating, “As a child, I scrounged through the trash heaps and smoked cigarette butts. I walked 10 km one way to school. I wore the same clothes for six months. In my youth, in a communal apartment, I didn’t eat for two or even three days. Now I am a millionaire.” Such comments underline the stark transformation from a life of hardship to one marked by illicit wealth.

The identification of these individuals represents a crucial step in the ongoing battle against cybercrime, reflecting the relentless efforts of law enforcement agencies worldwide to bring down sophisticated ransomware operations that threaten businesses and individuals alike.

Source link

Latest articles

BKA Identifies Leaders of REvil Ransomware Group

Unmasking Cybercriminals: Authorities Identify Key Figures in REvil Ransomware Gang In a significant breakthrough for...

Why SecOps and GRC Continue to Face Alignment Challenges in Financial Services Webinar

Bridging the Gap: Aligning Security Operations with Governance, Risk, and Compliance in Financial Services In...

Drift Protocol Targeted in $286 Million Suspected Crypto Heist Linked to North Korea

In a significant breach, hackers have reportedly pilfered approximately $286 million from Drift Protocol,...

NY School Data Incidents Increase by 72%

Surge in Cybersecurity Incidents in New York State Schools: A 2025 Overview In 2025, New...

More like this

BKA Identifies Leaders of REvil Ransomware Group

Unmasking Cybercriminals: Authorities Identify Key Figures in REvil Ransomware Gang In a significant breakthrough for...

Why SecOps and GRC Continue to Face Alignment Challenges in Financial Services Webinar

Bridging the Gap: Aligning Security Operations with Governance, Risk, and Compliance in Financial Services In...

Drift Protocol Targeted in $286 Million Suspected Crypto Heist Linked to North Korea

In a significant breach, hackers have reportedly pilfered approximately $286 million from Drift Protocol,...