German authorities identify alleged leader of REvil and GandCrab ransomware gangs

April 6, 20262 min read1 sources
Share:
German authorities identify alleged leader of REvil and GandCrab ransomware gangs

German law enforcement has publicly identified the alleged mastermind behind two of the most destructive ransomware families in recent history. Authorities named 31-year-old Russian national Daniil Maksimovich Shchukin as the operator behind the alias “UNKN,” who they say directed the GandCrab and REvil cybercrime syndicates.

According to Germany's Federal Criminal Police Office (BKA), Shchukin is linked to at least 130 acts of computer sabotage and extortion targeting German organizations between 2019 and 2021.

The GandCrab and REvil groups operated as highly profitable Ransomware-as-a-Service (RaaS) platforms, providing malware and infrastructure to affiliates in exchange for a cut of the profits. REvil, widely considered the successor to GandCrab, pioneered the “double extortion” tactic, where attackers not only encrypt a victim’s data but also steal it and threaten to publish it online if the ransom is not paid. These gangs were responsible for high-profile attacks against major corporations worldwide, including meat processor JBS and software provider Kaseya, causing billions of dollars in damages.

While Shchukin remains at large, the public identification is a significant step. An international arrest warrant is expected, which would severely restrict his ability to travel outside of Russia. However, prosecution remains a challenge, as Russia does not typically extradite its citizens to face charges in Western countries. The move primarily serves to disrupt the operator's activities and apply financial and social pressure.

This identification is the latest development in a sustained, multi-national effort to dismantle the ransomware ecosystem. Law enforcement agencies in Europe and North America have increasingly focused on identifying key players, seizing cryptocurrency assets, and disrupting the technical infrastructure that enables these widespread attacks. The BKA's announcement signals continued international cooperation in holding top-tier cybercriminals accountable for their actions.

Share:

// SOURCES

// RELATED

Anatomy of a failed budget cut: When the White House tried to defund America’s cyber defense

In 2020, the White House proposed a $707 million cut to CISA's budget, sparking bipartisan backlash and a debate on U.S. cyber readiness.

6 min readApr 8

Flowise AI agent builder under active CVSS 10.0 RCE exploitation; 12,000+ instances exposed

A critical CVSS 10.0 remote code execution vulnerability in the Flowise AI platform is under active attack, exposing over 12,000 instances to complete

5 min readApr 7

Fortinet customers confront actively exploited zero-day, with a full patch still pending

A critical, actively exploited SQL injection flaw (CVE-2024-35616) in FortiClient EMS allows for full server takeover. A hotfix is available now.

5 min readApr 7

BlueHammer zero-day leak puts Windows users at risk after researcher-Microsoft dispute

A disgruntled researcher has leaked “BlueHammer,” a Windows zero-day exploit, after a dispute with Microsoft, enabling attackers to gain full SYSTEM c

6 min readApr 7