BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks
嗯,用户让我帮忙总结这篇文章的内容,控制在100字以内。首先,我需要仔细阅读文章,抓住主要信息。文章讲的是德国警方破获了REvil勒索软件的主要成员身份,特别是UNKN和Anatoly Sergeevitsch Kravchuk。UNKN的真实身份是Daniil Shchukin,31岁,俄罗斯人。他们涉嫌在德国发动了130次攻击,造成超过3500万欧元的损失。REvil在2021年停止运营,后来俄罗斯和罗马尼亚逮捕了部分成员。 接下来,我需要把这些关键点浓缩到100字以内。重点包括:德国警方、REvil、主要成员身份、Daniil Shchukin、Anatoly Kravchuk、130次攻击、3540万欧元损失、REvil的活动时间、停运和逮捕情况。 要注意不要使用“文章内容总结”这样的开头,直接描述内容。可能的结构是:德国警方破获REvil勒索软件主要成员身份,涉及Daniil Shchukin和Anatoly Kravchuk,两人涉嫌多次攻击及巨额损失,REvil曾活跃至2021年并被执法行动打击。 现在检查字数是否符合要求,并确保信息准确无误。 </think> 德国警方破获REvil勒索软件主要成员身份,包括 Daniil Shchukin 和 Anatoly Kravchuk,两人涉嫌 130 起攻击及 3540 万欧元损失。REvil 曾活跃至 2021 年后停运,并被执法行动打击。 2026-4-6 06:59:0 Author: thehackernews.com(查看原文) 阅读量:35 收藏

Cybercrime / Financial Crime

Germany's Federal Criminal Police Office (aka BKA or the Bundeskriminalamt) has unmasked the real identity of the main threat actors associated with the now-defunct REvil (aka Sodinokibi) ransomware-as-a-service (RaaS) operation.

The threat actor, who went by the alias UNKN, functioned as a representative of the group, advertising the ransomware in June 2019 on the XSS cybercrime forum. He has now been identified as Daniil Maksimovich Shchukin, a 31-year-old Russian national. He also went by the online monikers Oneiilk2, Oneillk2, Oneillk22, and GandCrab.

The development was reported by independent security journalist Brian Krebs.

"From early 2019 at the latest until at least July 2021, the wanted person, in cooperation with other individuals, acted as the leader of one of the largest global ransomware groups, known as GandCrab/REvil," BKA said. "The perpetrators demanded large ransom payments in exchange for decrypting and not leaking data."

Also added to the wanted list is Anatoly Sergeevitsch Kravchuk, a 43-year-old Russian born in the Ukrainian city of Makiivka. He is alleged to have acted as the developer of REvil during the same time period.

Shchukin and Kravchuk are suspected of having carried out 130 ransomware attacks across Germany. Out of these, 25 cases led to the payment of €1.9 million ($2.19 million). The incidents collectively incurred financial damages exceeding €35.4 million ($40.8 million).

REvil (aka Water Mare and Gold Southfield) was one of the prolific ransomware groups that counted companies like JBS and Kaseya among its victims. An evolution of the GandCrab ransomware, the e-crime crew mysteriously went offline in mid-July 2021, only to resurface in two months later.

By October 2021, the group ceased operations, and its data leak site became inaccessible as part of a law enforcement operation. Weeks later, Romanian law enforcement authorities announced the arrest of two individuals for their roles as affiliates of the REvil ransomware family.

In a rare move, Russia's Federal Security Service (FSB) disclosed in January 2022 that it had arrested several members belonging to the notorious REvil ransomware gang and neutralized its operations. Four of those members were sent to several years in prison in October 2024, Russian news publication Kommersant reported.

UNKN also disappeared from the cybercrime forums coinciding with the operation, prompting another user, REvil (later renamed to 0_neday), to become the public face of the gang's operations.

In an interview with Recorded Future's Dmitry Smilyanets in March 2021, UNKN said he had been in the ransomware business since 2007 and that they had as many as 60 affiliates working for the group at one point.

"As a child, I scrounged through the trash heaps and smoked cigarette butts. I walked 10 km one way to the school," he was quoted as saying. "I wore the same clothes for six months. In my youth, in a communal apartment, I didn’t eat for two or even three days. Now I am a millionaire."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/bka-identifies-revil-leaders-behind-130.html
如有侵权请联系:admin#unsafe.sh