Threat IntelHIGH

Danii Shchukin - Europol Names Notorious Ransomware Leader

Featured image for Danii Shchukin - Europol Names Notorious Ransomware Leader
#Danii Shchukin#GandCrab#Anatoly Kravchuk#Europol#ransomware

Original Reporting

CSCSO Online

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

High severity — significant development or major threat actor activity

🎯
🎯 THREAT ACTOR PROFILE
Threat Actor / APT GroupDanii Shchukin
AliasesUNKN, Unknown, GandCrab
AttributionGerman Police, Europol
Target SectorsVarious
Target RegionsGermany, Russia
Active Since2019
Campaign NameGandCrab/Revi
Primary TTPsRansomware attacks, extortion
Tools UsedRansomware
MITRE ATT&CKT1486 (Data Encrypted for Impact)
MotivationFinancial gain
🎯

Basically, a hacker known as Danii Shchukin is now wanted by police for running a big ransomware group.

Quick Summary

Danii Shchukin, a notorious ransomware leader, has been named on Europol's most-wanted list. His criminal activities have caused millions in damages. Authorities are intensifying efforts to capture him and his accomplice.

What Happened

German police have officially identified Danii Shchukin, a notorious hacker known for leading one of the largest ransomware groups, GandCrab/Revi. He has now been placed on Europol's most-wanted list alongside his accomplice, Anatoly Kravchuk. Shchukin has been active since 2019, and his criminal activities have drawn significant attention from law enforcement agencies worldwide.

Who's Behind It

Danii Shchukin operated under aliases such as UNKN and Unknown. He is known for his strict operational protocols, including forbidding attacks on Russian entities and refusing collaboration with English-speaking hackers. His group, Revi, is believed to have connections with the DarkSide hacker group, which was responsible for the infamous Colonial Pipeline attack in 2021.

Tactics & Techniques

Shchukin is accused of 130 counts of organized and commercial extortion across Germany. In 25 cases, victims paid a total of €1.9 million (around $2.2 million) in ransom. The total economic damage attributed to his operations is estimated at €35.4 million. His tactics often involve sophisticated ransomware attacks that target various sectors, causing widespread disruption.

Defensive Measures

Law enforcement agencies are urging organizations to bolster their cybersecurity measures to protect against ransomware threats. This includes:

  • Regularly updating software and systems to patch vulnerabilities.
  • Educating employees about phishing and social engineering tactics that can lead to ransomware infections.
  • Implementing robust backup solutions to recover data without paying ransoms.

What's Next

With Shchukin and Kravchuk believed to be operating from Russia, the international community is on high alert. Law enforcement agencies are collaborating to track down these cybercriminals. Organizations are encouraged to report any suspicious activity and to remain vigilant against ransomware threats.

🏢 Impacted Sectors

All Sectors

Pro Insight

🔒 Pro insight: Shchukin's operational methods reflect a growing trend in ransomware groups to establish strict territorial rules and collaboration limits.

Sources

Original Report

CSCSO Online
Read Original

Related Pings

HIGHThreat Intel

Russian GRU - Exploiting Vulnerable Routers to Steal Data, Operation Masquerade Disrupts Network

The Russian GRU is exploiting vulnerable routers worldwide, prompting a joint advisory from cybersecurity agencies. Operation Masquerade has disrupted a significant DNS hijacking network operated by the GRU, affecting thousands of routers across the U.S.

Canadian Cyber Centre News·
HIGHThreat Intel

UK Exposes Russian Submarine Activity Near Undersea Cables

The UK has revealed Russian submarines' covert operations near undersea cables, raising alarms about potential sabotage. This activity threatens vital connectivity for the UK and beyond.

The Record·
HIGHThreat Intel

CISOs Can Learn from Musk Oxen - Third-Party Risks Explained

CISOs can learn valuable lessons from musk oxen about managing third-party risks. Recent cyberattacks highlight the importance of collaborative strategies. By working together, organizations can enhance their security posture against vulnerabilities.

CSO Online·
HIGHThreat Intel

Contagious Interview Campaign Expands - New Malicious Packages Found

The Contagious Interview campaign is growing, with new malicious packages targeting sensitive data. North Korean group UNC1069 is behind this expansion, raising alarms for users.

SC Media·
HIGHThreat Intel

Russia's Fancy Bear APT Continues Its Global Onslaught

Russia's Fancy Bear APT is on the attack again, targeting various organizations. Experts warn that patching and zero trust measures are essential. Stay vigilant to protect against these sophisticated threats.

Dark Reading·
HIGHThreat Intel

CyberAv3ngers - IRGC-Linked Group Targets Critical Infrastructure

CyberAv3ngers, an Iranian state-backed group, is targeting U.S. critical infrastructure, exposing over 5,200 devices to potential attacks. Immediate action is needed to bolster cybersecurity.

Tenable Blog·