{"id":14143,"date":"2026-05-03T13:46:48","date_gmt":"2026-05-03T13:46:48","guid":{"rendered":"https:\/\/www.securitytoday.de\/2026\/05\/08\/bka-revil-anfuehrer-130-angriffe-deutschland-strafverfolgung\/"},"modified":"2026-05-17T15:12:38","modified_gmt":"2026-05-17T15:12:38","slug":"bka-revil-anfuehrer-130-angriffe-deutschland-strafverfolgung","status":"publish","type":"post","link":"https:\/\/www.securitytoday.de\/en\/2026\/05\/03\/bka-revil-anfuehrer-130-angriffe-deutschland-strafverfolgung\/","title":{"rendered":"BKA Hunts REvil Leader After 130 Attacks on German Targets"},"content":{"rendered":"<p style=\"color:#69d8ed;font-size:0.9em;margin:0 0 16px;padding:0;\">7 Min. Read Time<\/p>\n<p><strong>At the end of April 2026, the BKA identified the alleged leader of the REvil group and initiated an international arrest warrant request. 130 documented attacks on German targets, damages of at least 35 million Euro in Germany alone. And yet: the structural obstacles to successful prosecution in ransomware cases remain largely unchanged &#8211; and that&#8217;s the really important message.<\/strong><\/p>\n<div style=\"background:#003340;color:#fff;padding:32px 36px;margin:32px 0;border-radius:8px;\">\n<p style=\"margin:0 0 18px 0;font-size:0.95em;font-weight:800;text-transform:uppercase;letter-spacing:0.2em;color:#69d8ed;border-bottom:2px solid rgba(105,216,237,0.25);padding-bottom:12px;\">Key Takeaways<\/p>\n<ul style=\"margin:0;padding-left:22px;color:rgba(255,255,255,0.92);line-height:1.6;\">\n<li style=\"margin-bottom:12px;color:rgba(255,255,255,0.92);\"><strong style=\"color:#69d8ed;\">BKA identifies REvil leader.<\/strong> Federal investigators have identified the alleged main operator of the REvil ransomware group. Arrest warrant filed, extradition requests submitted to third countries.<\/li>\n<li style=\"margin-bottom:12px;color:rgba(255,255,255,0.92);\"><strong style=\"color:#69d8ed;\">130 attacks on German targets, 35 million Euro damage.<\/strong> Between 2020 and 2024, REvil carried out at least 130 documented attacks on German companies and authorities. The direct economic damage in Germany is estimated at a minimum of 35 million Euro.<\/li>\n<li style=\"margin-bottom:12px;color:rgba(255,255,255,0.92);\"><strong style=\"color:#69d8ed;\">Prosecution remains structurally difficult.<\/strong> Identification is not arrest. REvil leadership typically operates from countries without extradition agreements. The symbolic value of law enforcement is valuable &#8211; but practical deterrence is limited.<\/li>\n<li style=\"color:rgba(255,255,255,0.92);\"><strong style=\"color:#69d8ed;\">For security teams, nothing changes operationally.<\/strong> Attribution doesn&#8217;t resolve existing vulnerabilities. Ransomware groups are modular &#8211; if one leader falls, affiliates and splinter groups take over.<\/li>\n<\/ul>\n<\/div>\n<p><strong>What is REvil?<\/strong> REvil (also known as Sodinokibi) is a Russian-speaking ransomware-as-a-service group active since 2019. The business model: core technology and infrastructure are provided by a core team, attacks are carried out by affiliates who receive a share of the ransom. REvil is responsible for some of the most spectacular ransomware cases in recent years &#8211; including the 2021 Kaseya VSA attack that affected thousands of managed service providers worldwide.<\/p>\n<p style=\"font-size:0.88em;color:#666;margin:20px 0 32px 0;border-top:1px solid #e5e5e5;border-bottom:1px solid #e5e5e5;padding:10px 0;\">Related: <a href=\"https:\/\/www.securitytoday.de\/en\/2026\/05\/03\/trellix-bestaetigt-quellcode-breach-was-ein-angriff-auf\/\">SecurityToday: Trellix source code breach &#8211; What vendor due diligence means for security tools<\/a><\/p>\n<h2 style=\"margin-top:48px;margin-bottom:20px;\">The BKA Case in Detail<\/h2>\n<p>BKA investigations have been ongoing for over two years, running parallel to investigations by the US FBI and Europol, according to information from the agency. The identification of the alleged leader was achieved through a combination of cryptocurrency blockchain analysis, infiltrated affiliate networks, and traditional intelligence gathering from the darknet.<\/p>\n<p>The decisive operational breakthrough came, according to the BKA, through cryptocurrency transactions. Although REvil ransoms were laundered through mixers and exchange platforms, they left behind traces that could be tracked over several years. Blockchain forensics companies like Chainalysis supported this analysis &#8211; a now-standard method in ransomware investigations.<\/p>\n<p>What&#8217;s next: The BKA has filed arrest warrants. Extradition requests have been sent to several countries. The problem: REvil leadership is allegedly based in Russia or countries without a robust extradition agreement with Germany or the EU. Identification is one investigative success &#8211; arrest and trial are a different matter.<\/p>\n<h2 style=\"margin-top:48px;margin-bottom:20px;\">Why Law Enforcement Struggles with Ransomware<\/h2>\n<p>The BKA case illustrates a fundamental problem. Ransomware operators don&#8217;t choose their location randomly. Russia, Belarus, Iran, North Korea &#8211; the countries from which the most active ransomware groups operate either have no extradition agreements with Western law enforcement or have actively hostile relationships.<\/p>\n<p>Even if identification is successful, attribution is not deterrence. REvil has &#8220;stopped&#8221; several times in 2022 due to internal conflicts and pressure from US authorities, only to continue under new names. The ransomware ecosystem is modular. Affiliates migrate to other groups. Infrastructure is rebuilt. A single arrest &#8211; if it were to happen &#8211; would slow down operations, not stop them.<\/p>\n<p>The BSI consistently describes in its situation reports: Ransomware is the threat with the highest potential economic damage for German companies. And at the same time, it is the threat where law enforcement has the least deterrent effect &#8211; because perpetrators remain out of reach.<\/p>\n<h2 style=\"margin-top:48px;margin-bottom:20px;\">What Security Teams Can Learn from the Case<\/h2>\n<p>For CISOs and security teams in German companies, the BKA&#8217;s success is neutral from an operational perspective. The threat from REvil affiliates and successor groups remains. What can be derived:<\/p>\n<p><strong>Blockchain forensics is a mature investigative approach.<\/strong> Those who pay ransoms leave a trail &#8211; this is not an argument against payment in emergency situations, but an argument for documenting transactions. Authorities use this data for later law enforcement and sanctions checks.<\/p>\n<p><strong>Affiliate networks remain the actual attack infrastructure.<\/strong> REvil leaders design tools and tactics. Affiliates carry out attacks, which are decided separately for each attack. A weakened core group does not mean fewer attacks.<\/p>\n<p><strong>Incident response planning remains the primary protective measure.<\/strong> Backup strategy, network segmentation, EDR coverage, offline backups &#8211; these are the levers that a security team controls. Law enforcement successes are no substitute for this.<\/p>\n<p style=\"font-size:0.85em;color:#555;margin-bottom:20px;\"><em>Sources: BKA press release April 2026, BSI situation report 2025, Europol Joint Investigation Team Ransomware.<\/em><\/p>\n<h2 style=\"padding-top:64px;margin-bottom:20px;\">Frequently Asked Questions<\/h2>\n<h3>How realistic is the arrest of the identified REvil leader?<\/h3>\n<p>Very low, as long as the person remains in a country without an extradition agreement with Germany or the EU. The BKA can issue arrest warrants and Interpol Red Notices. This will only be effective when the person enters a country that initiates extradition proceedings &#8211; which has historically been rare for Russia-based ransomware operators. The symbolic value of attribution outweighs the operational value.<\/p>\n<h3>Is REvil weakened as a threat after the BKA&#8217;s success?<\/h3>\n<p>Not operationally. REvil has &#8220;stopped&#8221; as a group several times since 2022 and has continued under new names or as splinter groups. The affiliate model means that attacks continue even if the core group is weakened. Security teams should not assume a reduced threat level.<\/p>\n<h3>What does cryptocurrency forensics mean for companies that have paid ransoms?<\/h3>\n<p>Ransom transactions are tracked by authorities and can be relevant for sanctions checks &#8211; especially if the recipient is later classified as a sanctioned person or group. Companies that have paid ransoms should document transactions and seek legal advice on potential sanctions risks. The OFAC (US Treasury Department) has published explicit guidelines for ransomware payments to sanctioned groups.<\/p>\n<h3>How do REvil successor groups differ from the original organization?<\/h3>\n<p>REvil offshoots and successors like BlackMatter and ALPHV\/BlackCat adopt technical methods and affiliate structures, but operate independently. The key differences: different encryption tools, different infrastructure hosting strategies, and different negotiation methods with victims. The BSI and CISA publish current information on known REvil successors in their regular situation reports.<\/p>\n<h3>What can KRITIS operators specifically learn from the case?<\/h3>\n<p>Three lessons: First, law enforcement doesn&#8217;t provide prospective protection &#8211; your own defenses must work regardless of whether perpetrators are arrested. Second, blockchain forensics means that ransom payments can be traced permanently &#8211; this has legal implications for later sanctions checks. Third, affiliate structures mean that the loss of a core actor doesn&#8217;t immediately provide protective effects. Incident response planning and offline backup strategies remain the most effective measures.<\/p>\n<p style=\"text-align:right;font-style:italic;color:#666;font-size:0.85em;\">Source title image: Pexels \/ Fatih Kopcal (px:32933039)<\/p>\n","protected":false},"excerpt":{"rendered":"7 Min. Read Time At the end of April 2026, the BKA identified the alleged leader of the REvil group and initiated an international arrest warrant request. 130 documented attacks on German targets, damages of at least 35 million Euro in Germany alone. And yet: the structural obstacles to successful prosecution in ransomware cases remain [&hellip;]","protected":false},"author":50,"featured_media":13970,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_focuskw":"BKA RE","_yoast_wpseo_title":"BKA Hunts REvil Leader After 130 Attacks on German Targets","_yoast_wpseo_metadesc":"BKA identifies REvil leader: 130 attacks on German targets, \u20ac35 million in damages. Why law enforcement still fails against ransomware.","_yoast_wpseo_meta-robots-noindex":"","_yoast_wpseo_meta-robots-nofollow":"","_yoast_wpseo_meta-robots-adv":"","_yoast_wpseo_canonical":"","_yoast_wpseo_opengraph-title":"","_yoast_wpseo_opengraph-description":"","_yoast_wpseo_opengraph-image":"https:\/\/www.securitytoday.de\/wp-content\/uploads\/2026\/05\/bka-revil-anfuehrer-130-angriffe-deutschland-strafverfolgung-ransomware-2026-cover-hero-1.jpg","_yoast_wpseo_opengraph-image-id":0,"_yoast_wpseo_twitter-title":"","_yoast_wpseo_twitter-description":"","_yoast_wpseo_twitter-image":"https:\/\/www.securitytoday.de\/wp-content\/uploads\/2026\/05\/bka-revil-anfuehrer-130-angriffe-deutschland-strafverfolgung-ransomware-2026-cover-hero-1.jpg","_yoast_wpseo_twitter-image-id":0,"footnotes":""},"categories":[3],"tags":[],"class_list":["post-14143","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-aktuelles"],"wpml_language":"en","wpml_translation_of":13960,"_links":{"self":[{"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/posts\/14143","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/users\/50"}],"replies":[{"embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/comments?post=14143"}],"version-history":[{"count":2,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/posts\/14143\/revisions"}],"predecessor-version":[{"id":14585,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/posts\/14143\/revisions\/14585"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/media\/13970"}],"wp:attachment":[{"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/media?parent=14143"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/categories?post=14143"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/tags?post=14143"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}