Authorities Unmask Alleged Mastermind Behind Notorious Ransomware Gangs GandCrab and REvil
<h2 id="introduction">Unveiling a Cybercrime Kingpin</h2><p>For years, the handle <strong>UNKN</strong> (or UNKNOWN) was synonymous with some of the most devastating ransomware operations in recent history. Now, German authorities have put a real name and face to that elusive nickname. According to an advisory from the <strong>German Federal Criminal Police (Bundeskriminalamt, or BKA)</strong>, the mastermind is <strong>Daniil Maksimovich Shchukin</strong>, a 31-year-old Russian national. He is alleged to have led both the <strong>GandCrab</strong> and <strong>REvil</strong> ransomware syndicates, orchestrating a spree of digital extortion that wreaked havoc across Germany and beyond.</p><figure style="margin:20px 0"><img src="https://krebsonsecurity.com/wp-content/uploads/2021/03/kos-27-03-2021.jpg" alt="Authorities Unmask Alleged Mastermind Behind Notorious Ransomware Gangs GandCrab and REvil" style="width:100%;height:auto;border-radius:8px" loading="lazy"><figcaption style="font-size:12px;color:#666;margin-top:5px">Source: krebsonsecurity.com</figcaption></figure><p>Alongside Shchukin, the BKA also named <strong>Anatoly Sergeevitsch Kravchuk</strong>, 43, also Russian, as a co-conspirator. The pair is accused of executing at least <strong>130 acts of computer sabotage and extortion</strong> between 2019 and 2021, extorting nearly <strong>€2 million</strong> in ransom payments and causing total economic damages exceeding <strong>€35 million</strong>.</p><h2 id="bka-advisory">The BKA Advisory: Details and Charges</h2><p>The BKA’s public identification of Shchukin marks a significant breakthrough in the fight against ransomware. The advisory described Shchukin as the head of two of the largest ransomware operations globally. These groups pioneered <strong>double extortion</strong>—a ruthless tactic where victims are charged once for a decryption key to unlock their systems and a second time to prevent the publication of stolen sensitive data.</p><p>Shchukin’s alleged role included overseeing the development and deployment of ransomware variants, managing the affiliate network, and coordinating attacks. The BKA statement emphasized that these activities <a href="#introduction">targeted numerous German entities</a>, causing widespread disruption to critical infrastructure and businesses.</p><h2 id="evolution">From GandCrab to REvil: A Cybercrime Evolution</h2><h3>The Rise of GandCrab</h3><p>The <strong>GandCrab ransomware affiliate program</strong> first appeared in January 2018. It offered hackers a lucrative business model: affiliates would infiltrate corporate networks, often via compromised credentials or phishing, and the GandCrab team would then expand access, exfiltrating vast troves of sensitive documents. The malware underwent five major revisions, each adding evasion techniques to thwart cybersecurity firms.</p><p>By May 31, 2019, the group boasted having extorted <strong>more than $2 billion</strong> from victims globally. In a notorious farewell message, the gang declared: <em>“We are a living proof that you can do evil and get off scot-free. We have proved that one can make a lifetime of money in one year.”</em></p><h3>REvil: A Rebranded Menace</h3><p>Coinciding with GandCrab’s shutdown, a new threat emerged: <strong>REvil</strong> (also known as Sodinokibi). It was introduced on a Russian cybercrime forum by a user named <strong>UNKNOWN</strong>, who deposited <strong>$1 million</strong> in escrow to demonstrate credibility. Many cybersecurity experts immediately recognized REvil as a reincarnation of GandCrab, sharing code and operational tactics.</p><p>UNKNOWN even granted an interview to <strong>Dmitry Smilyanets</strong>, a former hacker turned security researcher, further cementing the connection. The gang quickly became infamous for high-profile attacks, including the <a href="#financial-trail">supply chain breach</a> that paralyzed hundreds of organizations worldwide.</p><figure style="margin:20px 0"><img src="https://krebsonsecurity.com/wp-content/uploads/2026/04/shchukin-kravchuk.png" alt="Authorities Unmask Alleged Mastermind Behind Notorious Ransomware Gangs GandCrab and REvil" style="width:100%;height:auto;border-radius:8px" loading="lazy"><figcaption style="font-size:12px;color:#666;margin-top:5px">Source: krebsonsecurity.com</figcaption></figure><h2 id="financial-trail">Financial Trail and International Cooperation</h2><p>Shchukin’s name surfaced earlier in a <strong>February 2023 filing</strong> by the <strong>U.S. Department of Justice</strong>. That document sought the seizure of cryptocurrency accounts linked to REvil ransom proceeds. The government identified one digital wallet tied to Shchukin that contained <strong>over $317,000</strong> in illicit funds.</p><p>This collaboration between German and U.S. authorities underscores the global effort to dismantle ransomware operations. The BKA’s ability to link Shchukin to the UNKN alias provides law enforcement with a concrete target for prosecution and asset recovery.</p><h2 id="implications">Implications for Cybersecurity and the Ransomware Ecosystem</h2><p>The unmasking of Shchukin sends a strong message: even the most careful cybercriminals can be identified and held accountable. However, the ransomware-as-a-service (RaaS) model that GandCrab and REvil perfected continues to thrive. Affiliates often remain in the shadows, while core leaders like Shchukin face increasing scrutiny.</p><p>For organizations, this case highlights the importance of robust cybersecurity measures, including:</p><ul><li><strong>Regular backups</strong> stored offline to mitigate ransomware impact.</li><li><strong>Employee training</strong> to recognize phishing attempts.</li><li><strong>Network segmentation</strong> to limit lateral movement by attackers.</li><li><strong>Incident response plans</strong> to quickly contain breaches.</li></ul><p>The financial and reputational damage from ransomware can be catastrophic. While the arrest of key figures disrupts operations, new groups often fill the void. <a href="#introduction">Continued vigilance</a> and international cooperation remain essential.</p><h2 id="conclusion">Conclusion: A Step Forward, but the Battle Continues</h2><p>The identification of Daniil Shchukin as UNKN is a landmark victory for law enforcement, bringing a face to one of the most damaging ransomware enterprises. Yet the broader ransomware ecosystem remains resilient. The GandCrab and REvil operations may have ended, but their legacy lives on in countless copycat groups.</p><p>As authorities seize assets and issue indictments, the cybercrime community adapts. For now, the BKA has struck a blow against impunity—a reminder that <strong>no hacker is truly invisible</strong>.</p>
Tags: