Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Hackers Exploit ATHR to Launch Large-Scale AI-Powered Vishing and Credential Theft

April 17, 2026

CISA Alerts on ActiveMQ Input Validation Flaw Exploited in Attacks

April 17, 2026

Payouts King Emerges Amid New Ransomware Threat Tied to BlackBasta Affiliate Links

April 17, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » BKA Names REvil Leaders in 130 German Ransomware Attacks
Uncategorized

BKA Names REvil Leaders in 130 German Ransomware Attacks

Staff WriterBy Staff WriterApril 6, 2026No Comments3 Mins Read2 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Top Highlights

  1. Germany’s Federal Criminal Police Office (BKA) identified two key figures behind the REvil ransomware group, including Daniil Maksimovich Shchukin (alias UNKN) and Anatoly Kravchuk, responsible for multiple attacks and ransom demands.
  2. Shchukin and Kravchuk allegedly carried out 130 ransomware attacks worldwide, demanding €1.9 million and causing over €35.4 million in damages.
  3. REvil, a notorious ransomware gang evolving from GandCrab, went offline in mid-2021, with law enforcement arrests in Romania and Russia disrupting operations.
  4. UNKN, once a leading figure, disappeared amid law enforcement actions, with reports of his lengthy ransomware career and a rise from poverty to millionaire status.

Authorities Reveal the Leaders of REvil Ransomware

Germany’s Federal Criminal Police Office (BKA) has uncovered the identities of two key figures behind the notorious REvil ransomware group. This group, which targeted numerous companies, had previously operated in secret. One of the individuals, known online as UNKN, was responsible for promoting the ransomware in 2019. Now identified as 31-year-old Daniil Maksimovich Shchukin, he played a leading role from early 2019 until mid-2021. Shchukin worked with others to run one of the largest ransomware groups, demanding hefty ransom payments for decrypting data and preventing leaks. The second suspect, Anatoly Sergeevitsch Kravchuk, is believed to have developed the REvil malware during the same time. Both suspects are linked to 130 attacks across Germany, resulting in more than €35.4 million in damages. Notably, 25 of these attacks led to nearly €1.9 million in ransom payments. This discovery marks a significant breakthrough in tracing the leadership of a cybercrime operation that caused widespread financial harm.

Law Enforcement Efforts Disrupt Major Cybercriminal Network

REvil, also known as Water Mare and Gold Southfield, was a powerful ransomware group responsible for attacks on high-profile companies like JBS and Kaseya. The group evolved from GandCrab ransomware but mysteriously went offline in mid-2021. Shortly afterward, law enforcement agencies worldwide moved to dismantle it. In October 2021, Russian authorities arrested several REvil members and shut down its operations, which was rare for such cybercriminal groups. By January 2022, Russia’s Federal Security Service announced further arrests of REvil members, with some facing years in prison. Meanwhile, the group’s online presence vanished, and its public face changed. The authorities’ actions reflect growing efforts to combat cybercrime and bring cybercriminal leaders to justice. These developments remind us that while these gangs operate in shadows, law enforcement continues to advance in exposing and stopping them, contributing to a safer digital environment.

Expand Your Tech Knowledge

Dive deeper into the world of Cryptocurrency and its impact on global finance.

Explore past and present digital transformations on the Internet Archive.

DataProtection-V1

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleGoogle’s Bug Bounty Program Breaks Records with $17M Payouts in 2025
Next Article Unmasked: IT Worker Fights Kim Jong Un in Job Interview
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Swedish Government Links Pro-Russian Group to Heating Plant Cyberattack

April 15, 2026

Critical Flaws Fixed in April Patch Tuesday: Urgent Updates for SAP, Adobe, Microsoft, Fortinet & More

April 15, 2026

FBI & Indonesian Police Crush $20M W3LL Phishing Network

April 13, 2026

Comments are closed.

Latest Posts

Hackers Exploit ATHR to Launch Large-Scale AI-Powered Vishing and Credential Theft

April 17, 2026

CISA Alerts on ActiveMQ Input Validation Flaw Exploited in Attacks

April 17, 2026

Payouts King Emerges Amid New Ransomware Threat Tied to BlackBasta Affiliate Links

April 17, 2026

Emerson Integrates OPSWAT to Elevate OT Patch Management in Ovation Platform

April 17, 2026
Don't Miss

Swedish Government Links Pro-Russian Group to Heating Plant Cyberattack

By Staff WriterApril 15, 2026

Top Highlights Sweden publicly links a pro-Russian group to a failed cyberattack on a heating…

Critical Flaws Fixed in April Patch Tuesday: Urgent Updates for SAP, Adobe, Microsoft, Fortinet & More

April 15, 2026

FBI & Indonesian Police Crush $20M W3LL Phishing Network

April 13, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • Hackers Exploit ATHR to Launch Large-Scale AI-Powered Vishing and Credential Theft
  • CISA Alerts on ActiveMQ Input Validation Flaw Exploited in Attacks
  • Payouts King Emerges Amid New Ransomware Threat Tied to BlackBasta Affiliate Links
  • Emerson Integrates OPSWAT to Elevate OT Patch Management in Ovation Platform
  • EU’s New Age Verification App Can Be Cracked in Just 2 Minutes, Experts Warn
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Hackers Exploit ATHR to Launch Large-Scale AI-Powered Vishing and Credential Theft

April 17, 2026

CISA Alerts on ActiveMQ Input Validation Flaw Exploited in Attacks

April 17, 2026

Payouts King Emerges Amid New Ransomware Threat Tied to BlackBasta Affiliate Links

April 17, 2026
Most Popular

Protecting MCP Security: Defeating Prompt Injection & Tool Poisoning

January 30, 202629 Views

The New Face of DDoS is Impacted by AI

August 4, 202523 Views

Unlock the Power of Free WormGPT: Harnessing DeepSeek, Gemini, and Kimi-K2 AI Models

November 27, 202521 Views

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.