BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
NERF
The Vault
Threat Actors
Privacy Threats
Malware IoC
Dashboard
CVEs
Tags
Intel
NERFThe VaultThreat ActorsPrivacy ThreatsMalware IoCDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /German Authorities Identify REvil and GandCrab Ransomware Leader as Russian National

German Authorities Identify REvil and GandCrab Ransomware Leader as Russian National

mediumDarknet & Underground|April 6, 20262 min read

Originally reported by Krebs on Security

#ransomware#revil#gandcrab#attribution#law-enforcement#russia
Share

TL;DR

German law enforcement has identified 31-year-old Russian national Daniil Maksimovich Shchukin as "UNKN," the elusive leader of the defunct REvil and GandCrab ransomware groups. Authorities linked him to at least 130 ransomware attacks against German targets between 2019 and 2021.

Why medium?

While significant for attribution purposes, this identification does not indicate immediate active threat escalation or new exploitation capabilities, as both groups are no longer actively operating.

Attribution Breakthrough for Historic Ransomware Operations

German authorities have publicly identified the individual behind one of the most prolific ransomware operations in recent history. According to Krebs on Security, German law enforcement agencies have named 31-year-old Russian national Daniil Maksimovich Shchukin as the operator known by the handle "UNKN," who led both the GandCrab and REvil ransomware groups.

Scale of Operations

German investigators attribute at least 130 acts of computer sabotage and extortion to Shchukin's operations between 2019 and 2021, targeting victims specifically within Germany. This figure likely represents only a fraction of the global impact of both ransomware families during their operational periods.

The GandCrab ransomware family emerged as one of the earliest and most successful ransomware-as-a-service (RaaS) operations before transitioning to REvil (also known as Sodinokibi), which became one of the most notorious ransomware groups before its apparent dissolution in 2021.

Attribution Significance

The identification of "UNKN" represents a significant intelligence breakthrough, given the individual's central role in establishing the RaaS model that became the dominant ransomware operational framework. Both GandCrab and REvil pioneered techniques and business models later adopted across the ransomware ecosystem.

While both groups are no longer actively operating, the attribution provides law enforcement agencies with concrete intelligence linking specific individuals to ransomware operations that generated hundreds of millions in illicit revenue and caused extensive disruption to critical infrastructure and business operations globally.

Current Status

The disclosure comes years after both ransomware families ceased active operations. REvil's infrastructure went dark in late 2021 following increased law enforcement pressure and reported internal disputes. The timing and nature of this attribution suggests ongoing investigative efforts to map the leadership structures of defunct ransomware operations.

Sources

  • https://krebsonsecurity.com/2026/04/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/

Originally reported by Krebs on Security

Tags

#ransomware#revil#gandcrab#attribution#law-enforcement#russia

Threat Actors

🇷🇺REvil

Related Intelligence

  • Europol Operation Reveals CSAM Scammer Who Defrauded 10,000 Buyers

    mediumMar 31, 2026
  • RSAC 2026 Highlights: EU Leadership, AI-Driven Threats, and Industrial-Scale Identity Abuse

    mediumMar 26, 2026
  • Illinois Dealer Sentenced to 8 Years for Dark Web-to-Facebook Meth Distribution

    lowMar 12, 2026

Related Knowledge

  • OSINT Tradecraft Deep Dive

    reference
  • NERF Training: Recon & OSINT Deep Dive

    reference
  • Threat Intelligence Deep Training

    reference

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Ransomware Groups Weaponize EDR Bypass Techniques as DPRK Executes $285M Crypto Heist

Next Article

Fortinet Patches Critical FortiClient EMS Auth Bypass Under Active Exploitation→