Anavem
Languagefr
Dark server room with red emergency lighting and glowing computer monitors

German Police ID Russian Leaders of REvil Ransomware Gang

German Federal Police identified two Russian nationals as leaders of GandCrab and REvil ransomware operations that caused billions in damages worldwide.

7 April 2026, 01:54 5 min read

Last updated 7 April 2026, 02:30

SEVERITYHigh
EXPLOITUnknown
PATCH STATUSUnavailable
VENDORGerman Federal Police (BKA)
AFFECTEDGandCrab and REvil ransomware ...
CATEGORYCyber Attacks

Key Takeaways

German Federal Police Unmask REvil Ransomware Leadership

The German Federal Police (BKA) announced on April 6, 2026, that they've successfully identified two Russian nationals as the primary leaders behind the GandCrab and REvil ransomware operations that terrorized organizations worldwide between 2019 and 2021. The identification represents a significant breakthrough in one of the most extensive cybercriminal investigations in European history.

The investigation, which spanned multiple years and involved coordination with international law enforcement agencies, focused on dismantling the infrastructure and leadership of what became known as one of the most prolific ransomware-as-a-service operations ever documented. REvil, also known as Sodinokibi, emerged as the successor to GandCrab after the latter group announced their retirement in 2019, claiming to have earned over $2 billion in ransom payments.

According to the BKA's findings, the two identified individuals orchestrated a sophisticated criminal enterprise that operated through a franchise model, recruiting affiliates to deploy their ransomware while taking a percentage of ransom payments. The group's operations were characterized by their use of double extortion tactics, where victims faced both file encryption and the threat of sensitive data publication on dark web leak sites.

The ransomware operations targeted critical infrastructure, healthcare systems, educational institutions, and major corporations across North America, Europe, and Asia. Notable attacks attributed to REvil include the 2021 Kaseya supply chain attack that affected approximately 1,500 downstream companies, and the JBS meatpacking company attack that disrupted global food supply chains.

German authorities worked closely with CISA's cybersecurity division and other international partners to trace cryptocurrency transactions, analyze malware samples, and correlate attack patterns across multiple jurisdictions. The investigation leveraged advanced digital forensics techniques and blockchain analysis to connect the suspects to specific ransomware deployments and cryptocurrency wallets used for ransom collection.

Global Impact Scope of REvil Operations

The identified ransomware operations affected thousands of organizations across multiple sectors and geographic regions. Healthcare systems bore a particularly heavy burden, with hospitals forced to cancel surgeries and revert to paper-based systems during critical periods. Educational institutions, including major universities, lost research data and faced significant operational disruptions that affected academic calendars and student services.

Corporate victims spanned industries from manufacturing and retail to professional services and technology companies. The attacks often targeted organizations with annual revenues exceeding $100 million, as these entities were more likely to pay substantial ransom demands. Small and medium-sized businesses also fell victim, particularly those in the managed service provider ecosystem that became entry points for supply chain attacks.

Geographic analysis reveals that North American organizations comprised approximately 60% of confirmed victims, with European entities accounting for 25% and Asia-Pacific regions representing the remaining 15%. The attacks demonstrated a clear preference for English-speaking countries and regions with robust cyber insurance markets, suggesting the operators conducted detailed reconnaissance before selecting targets.

Critical infrastructure sectors including energy, water treatment, and transportation systems experienced targeted attacks that raised national security concerns. Several incidents required emergency response coordination between private sector victims and government agencies to prevent cascading failures across interconnected systems.

Investigation Methodology and Current Status

The BKA's investigation employed a multi-pronged approach combining traditional law enforcement techniques with cutting-edge cybersecurity analysis. Investigators analyzed over 10 terabytes of seized data from compromised systems, traced cryptocurrency transactions across multiple blockchain networks, and conducted behavioral analysis of the ransomware operators' communication patterns on underground forums.

Digital forensics teams reconstructed the ransomware deployment timeline by examining system logs, network traffic patterns, and malware artifacts left behind on victim networks. This analysis revealed the operators' preferred initial access methods, including exploitation of unpatched VPN appliances, compromised remote desktop protocol connections, and phishing campaigns targeting privileged user accounts.

The investigation benefited from cooperation with private sector cybersecurity firms that provided threat intelligence and malware analysis capabilities. Researchers tracked the evolution of REvil's encryption algorithms, payment portal infrastructure, and victim communication protocols to build a comprehensive profile of the operation's technical capabilities and organizational structure.

Despite the successful identification, both suspects remain at large and are believed to be residing in Russia, which does not have an extradition treaty with Germany for cybercrime cases. The BKA has issued international arrest warrants and added the individuals to Interpol's Red Notice database, restricting their ability to travel internationally.

Organizations can protect themselves against similar ransomware operations by implementing comprehensive backup strategies, maintaining current security patches, deploying endpoint detection and response solutions, and conducting regular security awareness training. The investigation findings emphasize the importance of network segmentation and privileged access management in limiting ransomware spread once initial compromise occurs.

Frequently Asked Questions

Who are the identified REvil ransomware leaders?+
German Federal Police identified two Russian nationals as the primary leaders of GandCrab and REvil ransomware operations. The suspects remain at large in Russia and are subject to international arrest warrants.
How much damage did REvil ransomware cause?+
REvil and its predecessor GandCrab caused billions of dollars in damages worldwide between 2019 and 2021. The operations affected thousands of organizations across healthcare, education, manufacturing, and critical infrastructure sectors.
Can the REvil leaders be arrested?+
Both identified suspects remain at large in Russia, which lacks an extradition treaty with Germany for cybercrime cases. International arrest warrants have been issued and the individuals are on Interpol's Red Notice database.

Discussion

Share your thoughts and insights

Sign in to join the discussion