HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High🔍 ThreatIntel

German Police Identify Two Key REvil/GandCrab Operators, Highlight Ongoing Ransomware Threat

German federal police have publicly named two individuals as senior architects of the REvil and GandCrab ransomware-as-a-service operations. The suspects are linked to dozens of attacks that extracted millions in ransom and caused tens of millions in damage, underscoring the persistent risk to third‑party ecosystems.

🛡️ LiveThreat™ Intelligence · 📅 April 07, 2026· 📰 therecord.media
🟠
Severity
High
🔍
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
4 sector(s)
Actions
4 recommended
📰
Source
therecord.media

German Police Identify Two Key REvil/GandCrab Operators, Highlight Ongoing Ransomware Threat

What Happened — German federal police (BKA) publicly named Daniil Shchuki and Anatoly Kravchuk as senior figures behind the defunct REvil and GandCrab ransomware-as‑a‑service operations. The two are alleged to have orchestrated roughly two dozen attacks that generated ≈ $2.3 M in ransom payments and ≈ $40 M in economic damage.

Why It Matters for TPRM

  • Confirms that high‑profile ransomware groups continue to be run by identifiable individuals, underscoring the persistence of the RaaS model.
  • Highlights the broad victim landscape (businesses, public institutions, critical services), meaning any third‑party relationship could be a potential target.
  • Provides actionable intelligence for risk‑based vendor assessments and incident‑response planning.

Who Is Affected — Technology‑SaaS providers, financial services firms, public sector agencies, and any organization that contracts with vendors potentially exposed to REvil‑style ransomware.

Recommended Actions

  • Review all third‑party contracts for ransomware‑related clauses and insurance coverage.
  • Validate that vendors maintain robust endpoint protection, regular backups, and incident‑response playbooks.
  • Incorporate the identified threat actors into threat‑intel feeds and monitor for related IOCs.

Technical Notes — The original GandCrab campaigns spread via phishing emails with malicious attachments; REvil later evolved to target larger enterprises, combining encryption with data exfiltration and double‑extortion tactics. No new CVEs were disclosed. Source: The Record

📰 Original Source
https://therecord.media/german-police-unmask-suspects-linked-revil-gandcrab

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.