← Back to Crime & Security

German Authorities Identify Leaders of REvil and GangCrab Ransomware Groups

Crime & SecurityAI-Generated & Algorithmically Scored·

AI-generated from multiple sources. Verify before acting on this reporting.

BERLIN — German authorities announced Monday that they have identified the leaders behind two of the world's most destructive ransomware syndicates, REvil and GangCrab. The identification marks a significant development in the ongoing international effort to dismantle cybercriminal infrastructure that has targeted hospitals, corporations, and government agencies across multiple continents.

The announcement, made by the Federal Criminal Police Office (BKA) in Wiesbaden, confirms that investigators have pinpointed the individuals responsible for orchestrating the operations of both groups. REvil, also known as Sodinokibi, gained notoriety for high-profile attacks including the 2021 breach of JBS Foods, which disrupted meat supply chains in North America. GangCrab, active since 2019, has been linked to thousands of encrypted systems and demands totaling millions of dollars.

Authorities did not immediately release the names of the identified suspects or disclose whether arrests have been made. The BKA stated that the identification was the result of a long-term investigation involving international cooperation. While specific details regarding the suspects' locations or nationalities remain undisclosed, officials indicated that the information could lead to further legal actions in the coming weeks.

The identification comes amid heightened global scrutiny of ransomware groups following a series of disruptive attacks in recent years. Cybersecurity experts have long warned that these organizations operate with the sophistication of legitimate businesses, employing developers, negotiators, and money launderers to maximize profits. The REvil group, in particular, was known for its double-extortion tactics, threatening to publish stolen data if ransoms were not paid.

Law enforcement officials have not explained the circumstances under which the leaders were identified or the specific methods used to trace their identities. Questions remain regarding whether the suspects are currently at large or if they are already in custody. The BKA also did not clarify if the identification was part of a broader operation involving other cybercrime groups.

The announcement has drawn attention from cybersecurity firms and government agencies worldwide. The U.S. Department of Justice and the European Union Agency for Cybersecurity have previously collaborated with German authorities on ransomware investigations. Officials from those agencies have not yet commented on the latest development.

As the investigation continues, authorities have not specified what steps will be taken next. The identification of the leaders represents a critical milestone, but the full impact on the ransomware ecosystem remains to be seen. Cybersecurity analysts are monitoring the situation closely, awaiting further details on potential arrests or the disruption of the groups' operations.

The BKA has not scheduled a press conference to provide additional information. For now, the focus remains on the possibility of dismantling the networks that have caused billions of dollars in damages globally.