Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
BKA Unveils Key Figures in REvil Ransomware Operations

BKA Unveils Key Figures in REvil Ransomware Operations

Posted on April 6, 2026 By CWS

Germany’s Federal Criminal Police Office (BKA) has successfully identified key individuals behind the notorious REvil ransomware operation. This group, known for its extensive ransomware-as-a-service activities, has been linked to numerous cyberattacks.

Unmasking the Masterminds

The BKA has revealed that the main actor behind the alias UNKN is Daniil Maksimovich Shchukin, a 31-year-old Russian national. Shchukin, also known by various online names such as Oneiilk2 and GandCrab, was instrumental in promoting the ransomware on cybercrime forums since June 2019. This breakthrough was reported by Brian Krebs, a well-known security journalist.

In conjunction with Shchukin, Anatoly Sergeevitsch Kravchuk, a 43-year-old from Makiivka, Ukraine, was identified as a major developer of the REvil ransomware. Both individuals are accused of orchestrating 130 ransomware incidents across Germany, leading to significant financial losses.

The Impact of REvil’s Operations

Out of the 130 attacks attributed to Shchukin and Kravchuk, 25 resulted in ransom payments totaling €1.9 million ($2.19 million). The overall financial damage from these attacks exceeded €35.4 million ($40.8 million). REvil, also known as Water Mare and Gold Southfield, was notorious for targeting large corporations such as JBS and Kaseya.

The ransomware group’s roots trace back to GandCrab, another infamous e-crime syndicate. Although REvil mysteriously went offline in July 2021, it briefly resurfaced before being dismantled through international law enforcement efforts by October of the same year.

Law Enforcement’s Global Crackdown

In a significant development, Russian authorities arrested several REvil members in January 2022, neutralizing their operations. By October 2024, four members had been sentenced to prison, as reported by Kommersant.

The individual known as UNKN vanished from cybercrime platforms during these operations, leading to another member, known as 0_neday, taking over as the group’s public representative. In an interview, UNKN disclosed his long-standing involvement in ransomware activities, dating back to 2007, and mentioned having numerous affiliates within the group.

The exposure and subsequent arrests of these key players mark a pivotal moment in the ongoing battle against global cybercrime, underscoring the importance of international cooperation in tackling such threats.

The Hacker News Tags:Anatoly Sergeevitsch Kravchuk, BKA, cyber threat, Cyberattack, Cybercrime, Cybersecurity, Daniil Maksimovich Shchukin, data breach, financial crime, GandCrab, Germany, Hacking, law enforcement, Ransomware, REvil

Post navigation

Previous Post: ResokerRAT Exploits Telegram API for Covert Control on Windows
Next Post: AI-Driven Penetration Testing Tool Enhances Linux Security

Related Posts

Chrome Extensions Turn Malicious, Sparking Security Concerns Chrome Extensions Turn Malicious, Sparking Security Concerns The Hacker News
China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes The Hacker News
Fortinet SSL VPNs Hit by Global Brute-Force Wave Before Attackers Shift to FortiManager Fortinet SSL VPNs Hit by Global Brute-Force Wave Before Attackers Shift to FortiManager The Hacker News
Drift Breach Chaos, Zero-Days Active, Patch Warnings, Smarter Threats & More Drift Breach Chaos, Zero-Days Active, Patch Warnings, Smarter Threats & More The Hacker News
Google’s AI ‘Big Sleep’ Finds 5 New Vulnerabilities in Apple’s Safari WebKit Google’s AI ‘Big Sleep’ Finds 5 New Vulnerabilities in Apple’s Safari WebKit The Hacker News
Researchers Reveal Reprompt Attack Allowing Single-Click Data Exfiltration From Microsoft Copilot Researchers Reveal Reprompt Attack Allowing Single-Click Data Exfiltration From Microsoft Copilot The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • North Korean Hackers Launch 1,700 Malicious Packages
  • Remote Code Execution Vulnerability in CUPS Exposed
  • AI Discovers Decade-Old RCE Flaw in Apache ActiveMQ
  • Iranian Cyber Threats Target U.S. Infrastructure
  • How Fiber Optic Cables Can Secretly Eavesdrop on Conversations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • North Korean Hackers Launch 1,700 Malicious Packages
  • Remote Code Execution Vulnerability in CUPS Exposed
  • AI Discovers Decade-Old RCE Flaw in Apache ActiveMQ
  • Iranian Cyber Threats Target U.S. Infrastructure
  • How Fiber Optic Cables Can Secretly Eavesdrop on Conversations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark