{"id":501,"date":"2026-04-06T07:42:08","date_gmt":"2026-04-06T07:42:08","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=501"},"modified":"2026-04-06T07:42:08","modified_gmt":"2026-04-06T07:42:08","slug":"bka-identifies-revil-leaders-behind-130-german-ransomware-attacks","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=501","title":{"rendered":"BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks"},"content":{"rendered":"<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">Apr 06, 2026<\/span><\/span><span class=\"p-tags\">Cybercrime \/ Financial Crime<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgsBHK8DX9E30isZVcn1e-a6p8bmNUAki0SmUh1Tkt9dP8L3D4_WcwT64CI5OVuh1brb1Z4pff7onp90K76ktHbs6-H6Kr0rq9Q2f03oW91e3mA5dN5XdLDyWNns5NcfXw7BKFzH28SbpaFo9l8TmMeZ7Mt6o1ePanKeFYGa8V1S9Rez_E30SIAx2yvfuNl\/s1700-e365\/revil-ransomware.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>Germany&#8217;s Federal Criminal Police Office (aka BKA or the Bundeskriminalamt) has unmasked the real identity of the main threat actors associated with the now-defunct REvil (aka <b>Sodinokibi<\/b>) ransomware-as-a-service (RaaS) operation.<\/p>\n<p>The threat actor, who went by the alias <b>UNKN<\/b>, functioned as a representative of the group, advertising the ransomware in June 2019 on the XSS cybercrime forum. He\u00a0has now been identified\u00a0as <a href=\"https:\/\/www.bka.de\/DE\/IhreSicherheit\/Fahndungen\/Personen\/BekanntePersonen\/CC_BW\/DMS\/Sachverhalt.html\">Daniil Maksimovich\u00a0Shchukin<\/a>, a 31-year-old Russian national. He\u00a0also went by the online monikers Oneiilk2, Oneillk2, Oneillk22, and\u00a0GandCrab.<\/p>\n<p>The development\u00a0was <a href=\"https:\/\/krebsonsecurity.com\/2026\/04\/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab\/\">reported<\/a> by independent security journalist Brian\u00a0Krebs.<\/p>\n<p>\u00abFrom early 2019 at the latest until at least July 2021, the wanted person, in cooperation with other individuals, acted as the leader of one of the largest global ransomware groups, known as GandCrab\/REvil,\u00bb BKA said. \u00abThe perpetrators demanded large ransom payments in exchange for decrypting and not leaking\u00a0data.\u00bb<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/vpn-risk-report-inside-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWajeG0cdaapf1GKTZRUZUB7BzuYGegyw5k0eAorJXlmkFdYCCeLXXhXYJuXU9lWD33rV6rRnIyly3czoNfYifpxk1eGA5slItPmim3HkubXoQMgC4J7hdQPywxGbWq7Eqeff_o6s2Fq-WmSFd5guwdLn7IqpveMqULqtVnd-ndnljWYGj45EkMFB7m0qm\/s728-e100\/z-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>Also added to the wanted list\u00a0is <a href=\"https:\/\/www.bka.de\/DE\/IhreSicherheit\/Fahndungen\/Personen\/BekanntePersonen\/CC_BW\/ASK\/Sachverhalt.html\">Anatoly Sergeevitsch\u00a0Kravchuk<\/a>, a 43-year-old Russian born in the Ukrainian city of Makiivka. He\u00a0is alleged to have acted as the developer of REvil during the same time\u00a0period.<\/p>\n<p>Shchukin and Kravchuk are suspected of having carried out 130 ransomware attacks across Germany. Out\u00a0of these, 25 cases led to the payment of \u20ac1.9\u00a0million ($2.19\u00a0million). The\u00a0incidents collectively incurred financial damages exceeding \u20ac35.4\u00a0million ($40.8\u00a0million).<\/p>\n<p><a href=\"https:\/\/unit42.paloaltonetworks.com\/revil-threat-actors\/\">REvil<\/a> (aka Water Mare and Gold Southfield) was one of\u00a0the <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/ransomware-spotlight\/ransomware-spotlight-revil\">prolific ransomware\u00a0groups<\/a> that counted companies like JBS and Kaseya among its victims. An\u00a0evolution of\u00a0the <a href=\"https:\/\/www.trellix.com\/blogs\/research\/dismantling-a-prolific-cybercriminal-empire\/\">GandCrab<\/a> ransomware, the e-crime\u00a0crew mysteriously went\u00a0offline in mid-July 2021, only to resurface in two months\u00a0later.<\/p>\n<p>By October 2021, the\u00a0group ceased operations, and its data leak site became inaccessible as part of\u00a0a law enforcement\u00a0operation. Weeks\u00a0later, Romanian law enforcement authorities announced the arrest of two individuals for their roles as affiliates of the REvil ransomware\u00a0family.<\/p>\n<p>In a rare move, Russia&#8217;s Federal Security Service\u00a0(FSB) disclosed in January 2022 that it had arrested several members belonging to the notorious REvil ransomware gang and neutralized its operations. Four\u00a0of those members\u00a0were sent to several years in\u00a0prison in October 2024, Russian news publication Kommersant\u00a0reported.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/fast-response-not-fast-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A\/s728-e100\/tl-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>UNKN\u00a0also <a href=\"https:\/\/www.kelacyber.com\/blog\/will-the-revil-story-finally-be-over\/\">disappeared<\/a> from the cybercrime forums coinciding with the operation, prompting another user, REvil (later renamed to 0_neday), to become the public face of the gang&#8217;s operations.<\/p>\n<p>In\u00a0an <a href=\"https:\/\/therecord.media\/i-scrounged-through-the-trash-heaps-now-im-a-millionaire-an-interview-with-revils-unknown\">interview<\/a> with Recorded Future&#8217;s Dmitry Smilyanets in March 2021, UNKN said he had been in the ransomware business since 2007 and that they had as many as 60 affiliates working for the group at one\u00a0point.<\/p>\n<p>\u00abAs a child, I scrounged through the trash heaps and smoked cigarette butts. I\u00a0walked 10 km one way to the school,\u00bb he was quoted as saying. \u00abI wore the same clothes for six months. In\u00a0my youth, in a communal apartment, I didn\u2019t eat for two or even three days. Now\u00a0I am a millionaire.\u00bb<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\ue804Ravie Lakshmanan\ue802Apr 06, 2026Cybercrime \/ Financial Crime Germany&#8217;s Federal Criminal Police Office (aka BKA or the Bundeskriminalamt) has unmasked the real identity of the main threat actors associated with the&hellip;<\/p>\n","protected":false},"author":1,"featured_media":502,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[24,1081,1084,1082,471,93,1083],"class_list":["post-501","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-attacks","tag-bka","tag-german","tag-identifies","tag-leaders","tag-ransomware","tag-revil"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/501","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=501"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/501\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/502"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=501"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=501"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=501"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}