German Authorities Pinpoint REvil and GandCrab Ransomware Masters

German Authorities Pinpoint REvil and GandCrab Ransomware Masters

Cyber Threat Intelligence reports that German authorities have successfully identified the alleged masterminds behind the notorious REvil and GandCrab ransomware operations. This development marks a significant step in the ongoing global effort to dismantle major cybercrime syndicates. The investigation, which has been underway for some time, reportedly focused on individuals believed to be central figures in the development, distribution, and management of these highly destructive ransomware families.

REvil and GandCrab were responsible for a vast number of high-profile attacks, extorting millions from businesses and organizations worldwide. Their tactics, techniques, and procedures (TTPs) were sophisticated, often involving double extortion โ€“ stealing data before encrypting it โ€“ to pressure victims into paying ransoms. The identification of key figures by German law enforcement could pave the way for future arrests and prosecutions, potentially disrupting the ransomware-as-a-service (RaaS) model that has fueled these criminal enterprises.

What This Means For You

  • Organizations should leverage intelligence from law enforcement and threat intel feeds about identified threat actors to proactively hunt for indicators of compromise (IOCs) associated with REvil and GandCrab TTPs, even if these specific variants are less active, as their infrastructure and operators may pivot to new ransomware families.
๐Ÿ”Ž
Is your vendor affected? Start hunting now. Search by organization or domain, set watchlist alerts, and get notified when your third parties are compromised.
Open Intel Bot โ†’
Source & Attribution
Source PlatformTelegram
ChannelCyber Threat Intelligence
PublishedApril 07, 2026 at 07:09 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

Ghostwriter Targets Ukraine Government with Prometheus Phishing

The Belarus-aligned threat actor, Ghostwriter (also tracked as UAC-0057 and UNC1151), is actively targeting Ukrainian government entities. According to The Hacker News, this group is...

threat-intelvulnerabilitymalwarephishing
/SCW Vulnerability Desk /MEDIUM /⚑ 3 IOCs /⚙ 3 Sigma

Trend Micro Apex One Zero-Day Under Active Exploitation

Trend Micro has confirmed a zero-day vulnerability in its Apex One security product, actively exploited on Windows systems. BleepingComputer reports that this critical flaw allows...

threat-inteldata-breachmalwarevulnerabilitymicrosoft
/SCW Vulnerability Desk /HIGH /⚑ 2 IOCs /⚙ 3 Sigma

Iranian APT Screening Serpens Uses AppDomainManager Hijacking in Espionage Campaigns

Palo Alto Unit 42 reports that the Iranian APT group Screening Serpens is actively employing sophisticated techniques, including AppDomainManager hijacking and new Remote Access Trojan...

threat-intelAPTmalwareresearchunit-42
/SCW Research /MEDIUM