German Federal Police Unmask REvil Ransomware Leadership
The German Federal Police (BKA) announced on April 6, 2026, that they've successfully identified two Russian nationals as the primary leaders behind the GandCrab and REvil ransomware operations that terrorized organizations worldwide between 2019 and 2021. The identification represents a significant breakthrough in one of the most extensive cybercriminal investigations in European history.
The investigation, which spanned multiple years and involved coordination with international law enforcement agencies, focused on dismantling the infrastructure and leadership of what became known as one of the most prolific ransomware-as-a-service operations ever documented. REvil, also known as Sodinokibi, emerged as the successor to GandCrab after the latter group announced their retirement in 2019, claiming to have earned over $2 billion in ransom payments.
According to the BKA's findings, the two identified individuals orchestrated a sophisticated criminal enterprise that operated through a franchise model, recruiting affiliates to deploy their ransomware while taking a percentage of ransom payments. The group's operations were characterized by their use of double extortion tactics, where victims faced both file encryption and the threat of sensitive data publication on dark web leak sites.
The ransomware operations targeted critical infrastructure, healthcare systems, educational institutions, and major corporations across North America, Europe, and Asia. Notable attacks attributed to REvil include the 2021 Kaseya supply chain attack that affected approximately 1,500 downstream companies, and the JBS meatpacking company attack that disrupted global food supply chains.
German authorities worked closely with CISA's cybersecurity division and other international partners to trace cryptocurrency transactions, analyze malware samples, and correlate attack patterns across multiple jurisdictions. The investigation leveraged advanced digital forensics techniques and blockchain analysis to connect the suspects to specific ransomware deployments and cryptocurrency wallets used for ransom collection.
Global Impact Scope of REvil Operations
The identified ransomware operations affected thousands of organizations across multiple sectors and geographic regions. Healthcare systems bore a particularly heavy burden, with hospitals forced to cancel surgeries and revert to paper-based systems during critical periods. Educational institutions, including major universities, lost research data and faced significant operational disruptions that affected academic calendars and student services.
Corporate victims spanned industries from manufacturing and retail to professional services and technology companies. The attacks often targeted organizations with annual revenues exceeding $100 million, as these entities were more likely to pay substantial ransom demands. Small and medium-sized businesses also fell victim, particularly those in the managed service provider ecosystem that became entry points for supply chain attacks.
Geographic analysis reveals that North American organizations comprised approximately 60% of confirmed victims, with European entities accounting for 25% and Asia-Pacific regions representing the remaining 15%. The attacks demonstrated a clear preference for English-speaking countries and regions with robust cyber insurance markets, suggesting the operators conducted detailed reconnaissance before selecting targets.
Critical infrastructure sectors including energy, water treatment, and transportation systems experienced targeted attacks that raised national security concerns. Several incidents required emergency response coordination between private sector victims and government agencies to prevent cascading failures across interconnected systems.
Investigation Methodology and Current Status
The BKA's investigation employed a multi-pronged approach combining traditional law enforcement techniques with cutting-edge cybersecurity analysis. Investigators analyzed over 10 terabytes of seized data from compromised systems, traced cryptocurrency transactions across multiple blockchain networks, and conducted behavioral analysis of the ransomware operators' communication patterns on underground forums.
Digital forensics teams reconstructed the ransomware deployment timeline by examining system logs, network traffic patterns, and malware artifacts left behind on victim networks. This analysis revealed the operators' preferred initial access methods, including exploitation of unpatched VPN appliances, compromised remote desktop protocol connections, and phishing campaigns targeting privileged user accounts.
The investigation benefited from cooperation with private sector cybersecurity firms that provided threat intelligence and malware analysis capabilities. Researchers tracked the evolution of REvil's encryption algorithms, payment portal infrastructure, and victim communication protocols to build a comprehensive profile of the operation's technical capabilities and organizational structure.
Despite the successful identification, both suspects remain at large and are believed to be residing in Russia, which does not have an extradition treaty with Germany for cybercrime cases. The BKA has issued international arrest warrants and added the individuals to Interpol's Red Notice database, restricting their ability to travel internationally.
Organizations can protect themselves against similar ransomware operations by implementing comprehensive backup strategies, maintaining current security patches, deploying endpoint detection and response solutions, and conducting regular security awareness training. The investigation findings emphasize the importance of network segmentation and privileged access management in limiting ransomware spread once initial compromise occurs.






