{"id":2590,"date":"2026-04-06T14:56:08","date_gmt":"2026-04-06T14:56:08","guid":{"rendered":"https:\/\/www.europesays.com\/germany\/2590\/"},"modified":"2026-04-06T14:56:08","modified_gmt":"2026-04-06T14:56:08","slug":"bka-unmasks-two-revil-ransomware-operators-behind-130-german-attacks","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/germany\/2590\/","title":{"rendered":"BKA unmasks two REvil Ransomware operators behind 130+ German attacks"},"content":{"rendered":"<p>\n\t\t\t\t\t\t\tBKA unmasks two REvil Ransomware operators behind 130+ German attacks\n\t\t\t\t\t\t<\/p>\n<p>\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/securityaffairs.com\/wp-content\/themes\/security_affairs\/images\/user-icon.svg\" alt=\"\"\/> <a href=\"https:\/\/securityaffairs.com\/author\/paganinip\" rel=\"nofollow noopener\" target=\"_blank\">Pierluigi Paganini<\/a><br \/>\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/securityaffairs.com\/wp-content\/themes\/security_affairs\/images\/clock-icon.svg\" alt=\"\"\/> April 06, 2026<\/p>\n<p>\t\t\t\t\t\t<img decoding=\"async\" class=\"img-fluid mb-4\" src=\"https:\/\/www.europesays.com\/germany\/wp-content\/uploads\/2026\/04\/image-7.png\" alt=\"\"\/><\/p>\n<p>German police BKA identified two key REvil ransomware members, linking them to over 130 attacks in Germany.<\/p>\n<p>Germany\u2019s Federal Criminal Police (BKA) has identified two key figures behind the <a href=\"https:\/\/securityaffairs.com\/tag\/revil-ransomware\" type=\"post_tag\" id=\"10850\" rel=\"nofollow noopener\" target=\"_blank\">REvil ransomware<\/a> group, linking them to more than 130 attacks in the country. The first suspect is Daniil Maksimovich Shchukin (31), a Russian national known online as UNKN, who promoted ransomware on cybercrime forums.<\/p>\n<p>\u201cDaniil Maksimovich Shchukin is wanted internationally on suspicion of numerous organized and commercial ransomware extortions targeting businesses, public institutions, and other organizations.\u201d reads the <a href=\"https:\/\/www.bka.de\/DE\/IhreSicherheit\/Fahndungen\/Personen\/BekanntePersonen\/CC_BW\/DMS\/Sachverhalt.html?nn=26874#detailinformationen265540\" rel=\"nofollow noopener\" target=\"_blank\">BKA\u2019s Announcement<\/a>. \u201cFrom at least the beginning of 2019 until at least July 2021, he and others acted as the leader of one of the world\u2019s largest ransomware groups, known as GandCrab\/REvil.\u201d<\/p>\n<p>Between early 2019 and July 2021, Shchukin promoted the ransomware on the popular XSS cybercrime forums.<\/p>\n<p>\u201cAn elusive hacker who went by the handle \u201cUNKN\u201d and ran the early Russian ransomware groups\u00a0<a href=\"https:\/\/securityaffairs.com\/tag\/gandcrab\" type=\"post_tag\" id=\"7719\" rel=\"nofollow noopener\" target=\"_blank\">GandCrab<\/a>\u00a0and\u00a0REvil\u00a0now has a name and a face. Authorities in Germany say 31-year-old Russian\u00a0Daniil Maksimovich Shchukin\u00a0headed both cybercrime gangs and helped carry out at least 130 acts of computer sabotage and extortion against victims across the country between 2019 and 2021.\u201d <a href=\"https:\/\/krebsonsecurity.com\/2026\/04\/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab\/\" rel=\"nofollow noopener\" target=\"_blank\">reported<\/a> the popular cybersecurity investigator Brian Krebs. \u201cShchukin was named as UNKN (a.k.a. UNKNOWN) in\u00a0<a href=\"https:\/\/www.bka.de\/DE\/IhreSicherheit\/Fahndungen\/Personen\/BekanntePersonen\/CC_BW\/DMS\/Sachverhalt.html?nn=26874#detailinformationen265540\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">an advisory<\/a>\u00a0published by the\u00a0German Federal Criminal Police\u00a0(the \u201cBundeskriminalamt\u201d or BKA for short). The BKA said Shchukin and another Russian \u2014 43-year-old\u00a0Anatoly Sergeevitsch Kravchuk\u00a0\u2014 extorted nearly $2 million euros across two dozen cyberattacks that caused more than 35 million euros in total economic damage.\u201d<\/p>\n<p>Krebs remarked that Shchukin\u2019s name appeared in a <a href=\"https:\/\/krebsonsecurity.com\/2026\/04\/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab\/#:~:text=Germany%E2%80%99s%20BKA%20said,reorganization%20of%20GandCrab.\" rel=\"nofollow noopener\" target=\"_blank\">2023 U.S. case<\/a> tied to crypto funds from REvil, including a wallet with over $317,000.<\/p>\n<p>On May 31, 2019, the GandCrab group shut down after earning over $2 billion from ransomware attacks and openly bragged about its success. Around the same time, REvil appeared, led by a figure known as UNKNOWN, who promoted the group on a Russian cybercrime forum and backed it with a $1 million escrow deposit.<\/p>\n<p>Experts see REvil as a rebrand of GandCrab, continuing the same model. UNKNOWN described how he rose from poverty to wealth through cybercrime and reinvested profits to expand and improve the operation like a business.<\/p>\n<p>REvil grew into a powerful ransomware group that targeted large organizations with high revenues and cyber insurance. In July 2021, it attacked <a href=\"https:\/\/securityaffairs.com\/tag\/kaseya\" type=\"post_tag\" id=\"12018\" rel=\"nofollow noopener\" target=\"_blank\">Kaseya<\/a>, impacting over 1,500 organizations. The FBI had already infiltrated REvil\u2019s systems and later released a free decryption key, weakening the group.<\/p>\n<p>In October 2021, the REvil ransomware gang <a href=\"https:\/\/securityaffairs.com\/123504\/cyber-crime\/revil-ransomware-shuts-down-once-again.html\" rel=\"nofollow noopener\" target=\"_blank\">shut down<\/a> its operation once again after a threat actor had hijacked their Tor leak site and payment portal. The news of the hack was shared by the REvil representative \u20180_neday\u2019 on the XSS hacking forum. He initially confirmed that someone has compromised their server, but later denied it.<\/p>\n<p>The news of the hack was first reported by\u00a0<a href=\"https:\/\/twitter.com\/ddd1ms\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Dmitry Smilyanets<\/a>\u00a0from Recorded Future.<\/p>\n<p>0_neday added that someone brought up the REvil hidden services using their private keys. He also said that the gang did not find signs of compromise to their servers; anyway, they have decided to shut down the operation.\u00a0<\/p>\n<p>Authorities link Shchukin to the operation and believe he now lives in Russia. Investigators also connect him to earlier cybercrime activity under the alias \u201cGer0in,\u201d tied to botnets and malware distribution.<\/p>\n<p>German police also added Anatoly Sergeevitsch Kravchuk, a 43-year-old Russian, to the wanted list, accusing him of developing REvil during the same period.<\/p>\n<p>\u201cAnatoly Sergeevich Kravchuk is wanted internationally on suspicion of numerous organized and commercial ransomware extortions targeting businesses, public institutions, and other organizations.\u201d <a href=\"https:\/\/www.bka.de\/DE\/IhreSicherheit\/Fahndungen\/Personen\/BekanntePersonen\/CC_BW\/ASK\/Sachverhalt.html\" rel=\"nofollow noopener\" target=\"_blank\">states BKA<\/a>. \u201cFrom at least the beginning of 2019 until at least July 2021, he and others acted as the head of one of the world\u2019s largest ransomware groups, known as GandCrab\/REvil.\u201d<\/p>\n<p>In October 2024, four former members of the REvil ransomware group <a href=\"https:\/\/securityaffairs.com\/170287\/cyber-crime\/revil-ransomware-group-member-sentenced.html\" rel=\"nofollow noopener\" target=\"_blank\">were sentenced<\/a> in Russia for hacking and money laundering, marking a rare case of Russian gang members being convicted in the country.<\/p>\n<p>The four men are Artem Zaets, Alexei Malozemov, Daniil Puzyrevsky, and Ruslan Khansvyarov. They were convicted of illegal payment handling, with Puzyrevsky and Khansvyarov also found guilty of malware use and distribution.<\/p>\n<p>They were found guilty of illegal payment handling, while Puzyrevsky and Khansvyarov were also convicted of using and distributing malware.<\/p>\n<p>\u201cOn Friday, October 25, the St. Petersburg Garrison Military Court announced the verdict against Artem Zayets, Aleksey Malozemov, Daniil Puzyrevsky and Ruslan Khansvyarov. The court found them guilty of illegal circulation of means of payment (Part 2 of Article 187 of the Criminal Code of the Russian Federation).\u201d\u00a0<a href=\"https:\/\/www.kommersant.ru\/doc\/7263987\" rel=\"nofollow noopener\" target=\"_blank\">reported<\/a>\u00a0Russian news outlet Kommersant. \u201cPuzyrevsky and Khansvyarov were also found guilty of using and distributing malicious programs (Part 2 of Article 273 of the Criminal Code of the Russian Federation), a Kommersant-SPb correspondent reports from the courtroom.\u201d<\/p>\n<p>Zayets and Malozemov received 4.5 and 5 years, while Khansvyarov and Puzyrevsky were sentenced to 5.5 and 6 years in a general regime penal colony.<\/p>\n<p>The four men were identified as part of an investigation on the REvil ransomware group, prompted by a U.S. request linking the group\u2019s leader to cyberattacks on foreign tech firms. The authorities initially identified 14 suspects who were detained, with eight brought to trial and four more \u2013 Andrey Bessonov, Mikhail Golovachuk, Roman Muromsky, and Dmitry Korotayev \u2013 facing separate charges of illegal computer access. The cases have been sent to the Russian Prosecutor General\u2019s Office for consolidation, and all defendants have been held since early 2022.<\/p>\n<p>On May 2024, the Ukrainian national,\u00a0<a href=\"https:\/\/securityaffairs.com\/124352\/cyber-crime\/doj-charges-revil-ransomware-affiliate.html\" rel=\"nofollow noopener\" target=\"_blank\">Yaroslav Vasinskyi<\/a>\u00a0(24), aka Rabotnik,\u00a0<a href=\"https:\/\/securityaffairs.com\/162679\/cyber-crime\/revil-gang-member-sentenced.html\" rel=\"nofollow noopener\" target=\"_blank\">was sentenced<\/a>\u00a0to more than 13 years in prison and must pay $16 million in restitution for conducting numerous ransomware attacks and extorting victims.<\/p>\n<p>The man is a member of the\u00a0<a href=\"https:\/\/securityaffairs.com\/123504\/cyber-crime\/revil-ransomware-shuts-down-once-again.html\" rel=\"nofollow noopener\" target=\"_blank\">REvil ransomware gang<\/a>\u00a0and was sentenced for his role in carrying out more than 2,500 ransomware attacks and demanding over $700 million in ransom payments.<\/p>\n<p>In November 2021, the US Department of Justice charged Vasinskyi, REvil ransomware affiliate, for orchestrating the\u00a0ransomware attacks on\u00a0<a href=\"https:\/\/securityaffairs.com\/119650\/cyber-crime\/kaseya-vsa-supply-chain-ransomware-attack.html\" rel=\"nofollow noopener\" target=\"_blank\">Kaseya MSP platform<\/a>\u00a0that took place on July 4, 2021.<\/p>\n<p>Vasinskyi (aka Profcomserv, Rabotnik, Rabotnik_New, Yarik45, Yaraslav2468, and Affiliate 22) was arrested on October 8, 2021, while he was trying to enter Poland. Vasinskyi was\u00a0extradited\u00a0to the U.S. in March 2022.<\/p>\n<p>Vasinskyi is a\u00a0<a href=\"https:\/\/securityaffairs.co\/wordpress\/123504\/cyber-crime\/revil-ransomware-shuts-down-once-again.html\" rel=\"nofollow noopener\" target=\"_blank\">REvil ransomware<\/a>\u00a0affiliate since at least March 1st, 2019.<\/p>\n<p>Follow me on Twitter:\u00a0<a href=\"https:\/\/twitter.com\/securityaffairs\" rel=\"nofollow noopener\" target=\"_blank\">@securityaffairs<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.facebook.com\/sec.affairs\" rel=\"nofollow noopener\" target=\"_blank\">Facebook<\/a>\u00a0and\u00a0<a href=\"https:\/\/infosec.exchange\/@securityaffairs\" rel=\"nofollow noopener\" target=\"_blank\">Mastodon<\/a><\/p>\n<p><a href=\"http:\/\/www.linkedin.com\/pub\/pierluigi-paganini\/b\/742\/559\" rel=\"nofollow noopener\" target=\"_blank\">Pierluigi\u00a0Paganini<\/a><\/p>\n<p>(<a href=\"http:\/\/securityaffairs.co\/wordpress\/\" rel=\"nofollow noopener\" target=\"_blank\">SecurityAffairs<\/a>\u00a0\u2013\u00a0hacking,\u00a0cybercrime)<\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"BKA unmasks two REvil Ransomware operators behind 130+ German attacks Pierluigi Paganini April 06, 2026 German police BKA&hellip;\n","protected":false},"author":2,"featured_media":2591,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[2821,2323,2822,5,2326,2327,2328,2329,2330,2331,2823,2333,2334],"class_list":{"0":"post-2590","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-germany","8":"tag-bka","9":"tag-cybercrime","10":"tag-gandcrab-ransomware","11":"tag-germany","12":"tag-hacking","13":"tag-hacking-news","14":"tag-information-security-news","15":"tag-it-information-security","16":"tag-malware","17":"tag-pierluigi-paganini","18":"tag-revil-ransomware","19":"tag-security-affairs","20":"tag-security-news"},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/germany\/wp-json\/wp\/v2\/posts\/2590","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/germany\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/germany\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/germany\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/germany\/wp-json\/wp\/v2\/comments?post=2590"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/germany\/wp-json\/wp\/v2\/posts\/2590\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/germany\/wp-json\/wp\/v2\/media\/2591"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/germany\/wp-json\/wp\/v2\/media?parent=2590"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/germany\/wp-json\/wp\/v2\/categories?post=2590"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/germany\/wp-json\/wp\/v2\/tags?post=2590"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}