Germany Names Suspected Leader of REvil and GandCrab Ransomware Gangs

Germany Names Suspected Leader of REvil and GandCrab Ransomware Gangs

The Cyber Express
The Cyber ExpressApr 7, 2026

Companies Mentioned

Why It Matters

Pinpointing a key figure disrupts the command structure of a lucrative ransomware operation and signals heightened international pressure on cybercriminal economies. It also underscores that despite arrests, the underlying business model persists, affecting global corporate risk.

Key Takeaways

  • German police identify 31‑year‑old Russian leader of REvil
  • He oversaw 130 attacks, causing €35 M (~$37 M) damage
  • REvil pioneered “double extortion,” now industry standard
  • Ransomware operates as a business with specialized service ecosystem
  • Identification unlikely to halt ecosystem; operators remain at large

Pulse Analysis

The revelation that German investigators have linked a real identity to the notorious REvil and its predecessor GandCrab is more than a headline—it offers a rare glimpse into the hierarchy of a cybercrime syndicate that once generated billions in illicit revenue. By naming Daniil Maksimovich Shchukin, authorities expose the human node behind a network that leveraged "double extortion" to extract roughly €2 million (about $2.1 million) in ransom payments while inflicting €35 million (around $36.8 million) in collateral damage. This identification not only validates years of multinational investigative work but also provides a concrete target for future sanctions and asset seizures.

Beyond the individual, the case highlights the evolution of ransomware from a loosely coordinated hacktivist effort into a sophisticated, profit‑driven industry. GandCrab’s affiliate model laid the groundwork for REvil’s "big‑game hunting" strategy, where specialized actors—access brokers, encryption developers, and crypto‑laundering services—operate like a supply chain. Such industrialization enables rapid scaling, continuous tool refinement, and the ability to demand higher payouts from well‑insured enterprises. The double‑extortion tactic, now a de‑facto standard, forces victims to weigh the cost of data exposure against ransom, amplifying the financial stakes for organizations across sectors.

For businesses, the takeaway is clear: technical defenses alone are insufficient. Companies must adopt comprehensive risk management that includes cyber‑insurance scrutiny, incident response planning, and continuous threat intelligence monitoring. Law‑enforcement successes, while encouraging, do not dismantle the underlying ecosystem; the market adapts, spawning new actors who inherit the same playbook. Executives should therefore treat ransomware as an evolving business risk, integrating strategic resilience measures to mitigate both the immediate financial impact and the longer‑term reputational fallout.

Germany Names Suspected Leader of REvil and GandCrab Ransomware Gangs

Comments

Want to join the conversation?

Loading comments...