German authorities identify REvil and GangCrab ransomware bosses
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。用户的要求是直接写文章描述,不需要特定的开头。 首先,我通读文章,发现主要讲德国联邦警察识别了两名俄罗斯人作为 GandCrab 和 REvil 勒索软件的领导者,时间跨度是2019到2021年。他们参与了至少130起针对德国公司的勒索案件,受害者支付了超过220万美元的赎金,总损失超过4000万美元。 接下来,我需要将这些关键信息浓缩到100字以内。要突出人物、事件、时间和影响。同时,保持语言简洁明了。 可能会这样组织:德国警方识别两名俄罗斯人为 GandCrab 和 REvil 的领导者,涉及多起勒索案件,造成巨大损失。最后提到他们目前在俄罗斯,并呼吁公众提供线索。 检查字数是否在限制内,并确保所有关键点都被涵盖。最后确认语言流畅自然。 </think> 德国联邦警察识别两名俄罗斯人为GandCrab和REvil勒索软件的主要负责人,两人自2019年起参与至少130起针对德国企业的勒索案件,造成超4000万美元损失。 2026-4-7 00:0:26 Author: www.bleepingcomputer.com(查看原文) 阅读量:11 收藏

German authorities identify REvil and GangCrab ransomware bosses

The Federal Police in Germany (BKA) has identified two Russian nationals as the leaders of GandCrab and REvil ransomware operations between 2019 and 2021.

According to BKA's disclosure, 31-year-old Daniil Maksimovich Shchukin and 43-year-old Anatoly Sergeevitsch Kravchuk acted as the heads of the two ransomware groups "from at least the beginning of 2019 until at least July 2021."

Shchukin hid behind the monikers UNKN/UNKNOWN for years, posting on cybercrime forums and speaking as a representative of the ransomware operation.

Wiz

The German authorities say that Shchukin and Kravchuk participated in at least 130 extortion cases targeting companies in the country specifically.

Following these attacks, at least 25 victims paid Shchukin and his co-conspirators $2.2 million in ransom, while the total financial damage caused by them is estimated in excess of $40 million.

GandCrab started in early 2018, and its leader at the time decided to retire in June 2019, after claiming to have earned $2 billion from ransom payments. The leader, however, cashed out with $150 million, which they claimed to have invested in legal businesses.

GandCrab leader announcing their retirement
GandCrab leader announces retirement
source: BleepingComputer

Soon after, a new operation called REvil emerged, following the affiliate model established by GandCrab through advertising and building partnerships with cybercriminals.

REvil, also known as Sodinokibi, was formed from previous GandCrab affiliates and operators who had already learned the successful tactics and started to apply them to their operations.

REvil later added public leak sites and ran data auctions to pressure victims. Notable victims include multiple Texas local governmentscomputer giant Acer, and the Kaseya supply-chain attack that impacted around 1,500 downstream victims.

Following the massive Kaseya hack, REvil took a two-month break, during which law enforcement breached their servers and started to monitor operations.

Multiple infrastructure disruptions were recorded at the time, and in mid-January 2022, Russia arrested more than a dozen REvil gang members, who were released in 2025 after time served on carding charges.

It is unclear if either Shchukin or Kravchuk joined other ransomware operations following REvil’s demise in 2021.

BKA believes that Shchukin and Kravchuk are now in Russia and asks the public to share any information that could lead to their whereabouts. Relevant entries were also created on the EU’s Most Wanted portal.

The police shared several images, including tattoo photos, to help track down the two threat actors and bring them to justice.

tines

Automated Pentesting Covers Only 1 of 6 Surfaces.

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.


文章来源: https://www.bleepingcomputer.com/news/security/german-authorities-identify-revil-and-gangcrab-ransomware-bosses/
如有侵权请联系:admin#unsafe.sh