Skip to main content

Command Palette

Search for a command to run...

German authorities identify REvil and GandCrab ransomware bosses

Updated
2 min read
German authorities identify REvil and GandCrab ransomware bosses

The Federal Police in Germany (BKA) has identified two Russian nationals as the leaders of GandCrab and REvil ransomware operations between 2019 and 2021.

According to BKA's disclosure, 31-year-old and 43-year-old acted as the heads of the two ransomware groups "from at least the beginning of 2019 until at least July 2021."

Shchukin hid behind the monikers UNKN/UNKNOWN for years, and speaking as a representative of the ransomware operation.

The German authorities say that Shchukin and Kravchuk participated in at least 130 extortion cases targeting companies in the country specifically.

Following these attacks, at least 25 victims paid Shchukin and his co-conspirators $2.2 million in ransom, while the total financial damage caused by them is estimated in excess of $40 million.

GandCrab , and its leader at the time decided to , after claiming to have earned $2 billion from ransom payments. The leader, however, cashed out with $150 million, which they claimed to have invested in legal businesses.

GandCrab leader announces retirement source: BleepingComputer

Soon after, a new operation called REvil emerged, following the affiliate model established by GandCrab through advertising and building partnerships with cybercriminals.

REvil, also known as Sodinokibi, was formed from previous GandCrab affiliates and operators who had already learned the successful tactics and started to apply them to their operations.

REvil later added public leak sites and to pressure victims. Notable victims include multiple , , and the that impacted around 1,500 downstream victims.

Following the massive Kaseya hack, REvil took a two-month break, during which and started to monitor operations.

Multiple were recorded at the time, and in mid-January 2022, Russia arrested more than a dozen REvil gang members, who were after time served on carding charges.

It is unclear if either Shchukin or Kravchuk joined other ransomware operations following REvil’s demise in 2021.

BKA believes that Shchukin and Kravchuk are now in Russia and asks the public to share any information that could lead to their whereabouts. Relevant entries were also created on the .

The police shared several images, including tattoo photos, to help track down the two threat actors and bring them to justice.

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.


More from this blog

F

FPT Metrodata Indonesia Cyber Security

624 posts

FPT Metrodata Indonesia (FMI) provides news, analysis & guides on cybersecurity and threat intelligence for Indonesia & Vietnam. Visit https://news.fmisec.com. FMI: https://fmisec.com