HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High💀 Ransomware

BKA Unmasks Two REvil Operators Behind 130+ German Ransomware Attacks

German federal police have identified two Russian nationals as senior REvil members responsible for more than 130 ransomware incidents across German enterprises from 2019‑2021, causing €2 M in extorted funds and €35 M in economic damage. The revelation underscores the persistent ransomware risk for third‑party vendors.

🛡️ LiveThreat™ Intelligence · 📅 April 07, 2026· 📰 securityaffairs.com
🟠
Severity
High
💀
Type
Ransomware
🎯
Confidence
High
🏢
Affected
5 sector(s)
Actions
4 recommended
📰
Source
securityaffairs.com

BKA Identifies Two REvil Operators Behind 130+ German Ransomware Attacks

What Happened – Germany’s Federal Criminal Police (BKA) publicly named two Russian nationals – Daniil Maksimovich Shchukin (aka “UNKN”) and Anatoly Sergeevitsch Kravchuk – as senior members of the REvil ransomware group. The investigation links them to more than 130 ransomware incidents across German businesses and public institutions between 2019 and July 2021, resulting in roughly €2 million extorted and €35 million in total economic damage.

Why It Matters for TPRM

  • REvil’s leadership is now exposed, but the group remains active under new aliases, keeping the ransomware threat high for third‑party vendors.
  • The attacks spanned multiple sectors, showing that any supplier with inadequate cyber hygiene can become a ransomware target.
  • Confirmed financial loss and operational disruption illustrate the downstream risk to your own organization when a vendor is compromised.

Who Is Affected – Manufacturing, Healthcare, Public‑sector agencies, Financial services, Technology firms, and any midsize‑to‑large enterprises that relied on vulnerable on‑premise or cloud services in Germany.

Recommended Actions

  • Review all contracts with German‑based suppliers for ransomware‑specific clauses and incident‑response obligations.
  • Verify that vendors maintain up‑to‑date backups, offline storage, and tested restore procedures.
  • Conduct threat‑intel monitoring for REvil‑related IOCs (malware hashes, ransom notes, C2 domains).
  • Ensure cyber‑insurance policies cover ransomware extortion and business interruption.

Technical Notes – The REvil campaign leveraged typical ransomware delivery methods: phishing emails, exploit‑kits, and remote‑desktop abuse. Victims’ files were encrypted (AES‑256) and exfiltrated, with ransom notes demanding payment in cryptocurrency. No specific CVE was disclosed, but the group historically exploited unpatched Windows SMB and RDP services. Source: Security Affairs

📰 Original Source
https://securityaffairs.com/190401/cyber-crime/bka-unmasks-two-revil-ransomware-operators-behind-130-german-attacks.html

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.