German authorities identify REvil and GandCrab ransomware bosses
嗯,用户让我用中文总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我得仔细阅读文章内容。文章讲的是德国联邦警察识别了两名俄罗斯人作为GandCrab和REvil勒索软件的领导者,他们从2019年到2021年活跃。涉及到至少130起针对德国公司的勒索案件,赎金超过220万美元,总损失超过4000万美元。 接下来,我需要提取关键信息:两名俄罗斯人领导两个勒索软件组织,时间范围是2019到2021,涉及多起勒索案件和金额。同时,GandCrab和REvil的背景以及它们的影响也需要简要提及。 然后,我要确保总结在100字以内,并且直接描述内容,不使用“这篇文章总结了”之类的开头。可能的结构是先点明人物和组织,再说明他们的活动和影响。 最后,检查语言是否简洁明了,没有遗漏重要信息。确保涵盖领导人、时间范围、案件数量、金额以及这两个勒索软件的影响。 </think> 德国联邦警察确认两名俄罗斯男子为 GandCrab 和 REvil 勒索软件的主要领导者(2019-2021),涉及至少 130 起针对德国企业的勒索案件,赎金超 220 万美元,总损失超 4000 万美元。 2026-4-7 04:15:16 Author: www.bleepingcomputer.com(查看原文) 阅读量:35 收藏

German authorities identify REvil and GangCrab ransomware bosses

The Federal Police in Germany (BKA) has identified two Russian nationals as the leaders of GandCrab and REvil ransomware operations between 2019 and 2021.

According to BKA's disclosure, 31-year-old Daniil Maksimovich Shchukin and 43-year-old Anatoly Sergeevitsch Kravchuk acted as the heads of the two ransomware groups "from at least the beginning of 2019 until at least July 2021."

Shchukin hid behind the monikers UNKN/UNKNOWN for years, posting on cybercrime forums and speaking as a representative of the ransomware operation.

Wiz

The German authorities say that Shchukin and Kravchuk participated in at least 130 extortion cases targeting companies in the country specifically.

Following these attacks, at least 25 victims paid Shchukin and his co-conspirators $2.2 million in ransom, while the total financial damage caused by them is estimated in excess of $40 million.

GandCrab started in early 2018, and its leader at the time decided to retire in June 2019, after claiming to have earned $2 billion from ransom payments. The leader, however, cashed out with $150 million, which they claimed to have invested in legal businesses.

GandCrab leader announcing their retirement
GandCrab leader announces retirement
source: BleepingComputer

Soon after, a new operation called REvil emerged, following the affiliate model established by GandCrab through advertising and building partnerships with cybercriminals.

REvil, also known as Sodinokibi, was formed from previous GandCrab affiliates and operators who had already learned the successful tactics and started to apply them to their operations.

REvil later added public leak sites and ran data auctions to pressure victims. Notable victims include multiple Texas local governmentscomputer giant Acer, and the Kaseya supply-chain attack that impacted around 1,500 downstream victims.

Following the massive Kaseya hack, REvil took a two-month break, during which law enforcement breached their servers and started to monitor operations.

Multiple infrastructure disruptions were recorded at the time, and in mid-January 2022, Russia arrested more than a dozen REvil gang members, who were released in 2025 after time served on carding charges.

It is unclear if either Shchukin or Kravchuk joined other ransomware operations following REvil’s demise in 2021.

BKA believes that Shchukin and Kravchuk are now in Russia and asks the public to share any information that could lead to their whereabouts. Relevant entries were also created on the EU’s Most Wanted portal.

The police shared several images, including tattoo photos, to help track down the two threat actors and bring them to justice.

tines

Automated Pentesting Covers Only 1 of 6 Surfaces.

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.


文章来源: https://www.bleepingcomputer.com/news/security/german-authorities-identify-revil-and-gandcrab-ransomware-bosses/
如有侵权请联系:admin#unsafe.sh