{"id":45167,"date":"2026-04-07T08:16:19","date_gmt":"2026-04-07T00:16:19","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/07\/german-authorities-identify-revil-and-gangcrab-ransomware-bosses\/"},"modified":"2026-04-07T08:16:19","modified_gmt":"2026-04-07T00:16:19","slug":"german-authorities-identify-revil-and-gangcrab-ransomware-bosses","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/07\/german-authorities-identify-revil-and-gangcrab-ransomware-bosses\/","title":{"rendered":"German authorities identify REvil and GangCrab ransomware bosses"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2026\/04\/06\/revil.jpg\" width=\"1600\" alt=\"German authorities identify REvil and GangCrab ransomware bosses\"><\/p>\n<p>The Federal Police in Germany (BKA) has identified two Russian nationals as the leaders of GandCrab and REvil&nbsp;ransomware operations between 2019 and 2021.<\/p>\n<p>According to BKA&#8217;s disclosure,&nbsp;31-year-old&nbsp;<a href=\"https:\/\/www.bka.de\/DE\/IhreSicherheit\/Fahndungen\/Personen\/BekanntePersonen\/CC_BW\/DMS\/Sachverhalt.html?nn=26874#detailinformationen265540\" target=\"_blank\" rel=\"nofollow noopener\">Daniil Maksimovich Shchukin<\/a>&nbsp;and&nbsp;43-year-old&nbsp;<a href=\"https:\/\/www.bka.de\/DE\/IhreSicherheit\/Fahndungen\/Personen\/BekanntePersonen\/CC_BW\/ASK\/Sachverhalt.html?nn=26874#fahndungsgalerie265536\" target=\"_blank\" rel=\"nofollow noopener\">Anatoly Sergeevitsch Kravchuk<\/a>&nbsp;acted as the heads of the two ransomware groups &#8220;from at least the beginning of 2019 until at least July 2021.&#8221;<\/p>\n<p>Shchukin hid behind the monikers UNKN\/UNKNOWN for years, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/revil-ransomware-gang-claims-over-100-million-profit-in-a-year\/\" target=\"_blank\" rel=\"nofollow noopener\">posting on cybercrime forums<\/a> and speaking as a representative of the ransomware operation.<\/p>\n<div align=\"center\" style=\"width:98%; margin:0 auto; text-align:center; padding:4px; background:#f0f0f0; border:1px solid #ccc; border-radius:6px;\">  <a href=\"https:\/\/www.adaptivesecurity.com\/lp\/nb\/free-phishing-test?utm_source=display_network&amp;utm_medium=paid_display&amp;utm_campaign=2025_12_Linkedin_Social_NA_Brand_Awareness_Teachers_funding&amp;utm_id=701Rd00000ZoWjjIAF%2F&amp;utm_content=970_250\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/a\/as-Free-Phishing-970x250.jpg\" style=\"margin-top: 0px;\" alt=\"German authorities identify REvil and GangCrab ransomware bosses\"><\/a> <\/div>\n<p>The German authorities say that&nbsp;Shchukin and Kravchuk participated&nbsp;in at least 130 extortion cases targeting companies in the country specifically.<\/p>\n<p>Following these attacks, at least 25 victims paid Shchukin and his co-conspirators $2.2 million in ransom, while the total financial damage caused by them is estimated in excess of $40 million.<\/p>\n<p>GandCrab <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/gandcrab-ransomware-distributed-by-exploit-kits-appends-gdcb-extension\/\" target=\"_blank\" rel=\"nofollow noopener\">started in early 2018<\/a>, and its leader at the time decided to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/gandcrab-ransomware-shutting-down-after-claiming-to-earn-2-billion\/\" target=\"_blank\" rel=\"nofollow noopener\">retire in June 2019<\/a>, after claiming to have earned $2 billion from ransom payments.&nbsp;The leader, however, cashed out with $150 million, which they claimed to have invested in legal businesses.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"446\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/ransomware\/g\/gandcrab\/shutting-down\/gandcrab-message.jpg\" width=\"900\" alt=\"German authorities identify REvil and GangCrab ransomware bosses\"><figcaption><strong>GandCrab leader announces retirement<\/strong><br \/><em>source: BleepingComputer<\/em><\/figcaption><\/figure>\n<\/div>\n<p>Soon after, a new operation called REvil emerged, following&nbsp;the affiliate model established by GandCrab through advertising and building partnerships with cybercriminals.<\/p>\n<p>REvil, also known as Sodinokibi, was formed from previous GandCrab affiliates and operators who had already learned the successful tactics and started to apply them to their operations.<\/p>\n<p>REvil later added public leak sites and <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/revil-ransomware-creates-ebay-like-auction-site-for-stolen-data\/\" target=\"_blank\" rel=\"nofollow noopener\">ran data auctions<\/a> to pressure victims. Notable victims include multiple <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-want-25-million-ransom-for-texas-ransomware-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">Texas local governments<\/a>,&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/computer-giant-acer-hit-by-50-million-ransomware-attack\/\" target=\"_blank\" rel=\"nofollow noopener\">computer giant Acer<\/a>, and the <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/kaseya-roughly-1-500-businesses-hit-by-revil-ransomware-attack\/\" target=\"_blank\" rel=\"nofollow noopener\">Kaseya supply-chain attack<\/a> that impacted around 1,500 downstream victims.<\/p>\n<p>Following the massive Kaseya hack, REvil took a two-month break, during which <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/revil-ransomware-shuts-down-again-after-tor-sites-were-hijacked\/\" target=\"_blank\" rel=\"nofollow noopener\">law enforcement breached their servers<\/a> and started to monitor operations.<\/p>\n<p>Multiple&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/revil-ransomwares-servers-mysteriously-come-back-online\/\" target=\"_blank\" rel=\"nofollow noopener\">infrastructure disruptions<\/a>&nbsp;were recorded at the time, and in mid-January 2022, Russia arrested more than a dozen REvil gang members, who were <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/revil-hackers-released-after-time-served-on-carding-charges\/\" target=\"_blank\" rel=\"nofollow noopener\">released in 2025<\/a> after time served on carding charges.<\/p>\n<p>It is unclear if either Shchukin or Kravchuk joined other ransomware operations following REvil&rsquo;s demise in 2021.<\/p>\n<p>BKA believes that Shchukin and Kravchuk are now in Russia and asks the public to share any information that could lead to their whereabouts. Relevant entries were also created on the <a href=\"https:\/\/eumostwanted.eu\/#\/index.php\/shchukin-daniil-maksimovich\" target=\"_blank\" rel=\"nofollow noopener\">EU&rsquo;s Most Wanted portal<\/a>.<\/p>\n<p>The police shared several images, including tattoo photos, to help track down the two threat actors and bring them to justice.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/german-authorities-identify-revil-and-gangcrab-ransomware-bosses\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.bleepstatic.com\/c\/p\/picus-whitepaper.jpg\" alt=\"German authorities identify REvil and GangCrab ransomware bosses\"><\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Automated Pentesting Covers Only 1 of 6 Surfaces.<\/a><\/h2>\n<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.<\/p>\n<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.<\/p>\n<p>           <button><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Get Your Copy Now<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/legal\/interpol-operation-synergia-takes-down-1-300-servers-used-for-cybercrime\/\">Interpol operation Synergia takes down 1,300 servers used for cybercrime<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/legal\/police-arrests-2-phobos-ransomware-suspects-seizes-8base-sites\/\">Police arrests 2 Phobos ransomware suspects, seizes 8Base sites<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/gandcrab-ransomware-shutting-down-after-claiming-to-earn-2-billion\/\">GandCrab Ransomware Shutting Down After Claiming to Earn $2 Billion<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/die-linke-german-political-party-confirms-data-stolen-by-qilin-ransomware\/\">Die Linke German political party confirms data stolen by Qilin ransomware<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/russian-man-sentenced-for-operating-botnet-used-in-ransomware-attacks\/\">Manager of botnet used in ransomware attacks gets 2 years in prison<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Federal Police in Germany (BKA) has identified two  [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-45167","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45167","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45167"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45167\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45167"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45167"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45167"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}