In a significant victory for the cyber defense community, German authorities have finally unmasked the elusive actor known as "UNKN." The Federal Prosecutor's Office in Germany has identified 31-year-old Russian national Daniil Maksimovich Shchukin as the alleged ringleader behind two of the most destructive ransomware operations in recent history: GandCrab and REvil (Sodinokibi).
Shchukin is accused of orchestrating at least 130 acts of computer sabotage and extortion between 2019 and 2021. While this identification is a massive step in attribution, the technical reality is that the code, infrastructure, and TTPs developed under his leadership persist in the wild. Defenders must act now to hunt for residual indicators of these specific families and harden environments against the attack vectors these gangs popularized.
Technical Analysis
Threat Overview: The attribution centers on the "UNKN" persona, the architect of the GandCrab Ransomware-as-a-Service (RaaS) model and its successor, REvil. These operations were responsible for hundreds of millions of dollars in extortion.
Attack Chain and Methodology:
- GandCrab: Typically distributed via exploit kits (GrandSoft), phishing campaigns, and compromised RDP credentials. It was prolific for its use of legitimate system tools (like PowerShell) to disable security software and encrypt files.
- REvil (Sodinokibi): Evolved from GandCrab, notorious for "Big Game Hunting" and exploiting vulnerabilities in enterprise software (e.g., Kaseya VSA, Pulse Secure, ProxyShell). It utilizes a sophisticated combination of initial access brokers, manual lateral movement, and automated encryption.
Key Indicators of Compromise (IOCs): While specific infrastructure shifts, the behavioral artifacts remain consistent:
- Ransom Notes:
- GandCrab:
GANDCRAB DECRYPTOR.html,GANDCRAB DECRYPTOR.txt, or files with.GDCB/.CRABextensions. - REvil:
_README_.TXT,_README_.hta(often dropped in every folder), or file extensions with random 5-6 character alpha-numeric sequences (e.g.,.A5F3E).
- GandCrab:
- Persistence: REvil often creates a registry key to track the encryption status or maintain persistence:
HKCU\Software\[Random CLSID]orHKCU\Software\REvil. - Mutexes: GandCrab variants historically used mutexes like
Global\GdPb{Random}. REvil often utilizesGlobal\MsWinZzsCacheLockMutex.
Exploitation Status: These are established, commodity threats. While the specific campaigns referenced in the German indictment occurred between 2019-2021, the source code and variants have leaked and been re-incorporated into new payloads. Active exploitation of these specific TTPs is ongoing via copycat actors.
Detection & Response
Sigma Rules
The following rules target the specific artifact creation and persistence mechanisms associated with the GandCrab and REvil families under Shchukin's operation.
---
title: Potential GandCrab Ransomware Note Creation
id: 9e8b1d2c-4a5f-4b3c-8d9e-1a2b3c4d5e6f
status: experimental
description: Detects the creation of GandCrab ransomware notes (html/txt) which are specific artifacts left by the gang led by UNKN.
references:
- https://krebsonsecurity.com/2026/04/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/
author: Security Arsenal
date: 2026/04/06
tags:
- attack.impact
- attack.t1486
logsource:
category: file_event
product: windows
detection:
selection:
TargetFilename|contains:
- 'GANDCRAB'
- 'DECRYPT'
TargetFilename|endswith:
- '.html'
- '.txt'
condition: selection
falsepositives:
- Legitimate administrative scripts (rare)
level: critical
---
title: REvil (Sodinokibi) Ransomware Note Creation
id: a1b2c3d4-5e6f-7a8b-9c0d-1e2f3a4b5c6d
status: experimental
description: Detects the creation of the characteristic _README_ ransom note used by REvil to instruct victims on payment.
references:
- https://krebsonsecurity.com/2026/04/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/
author: Security Arsenal
date: 2026/04/06
tags:
- attack.impact
- attack.t1486
logsource:
category: file_event
product: windows
detection:
selection:
TargetFilename|endswith:
- '_README_.TXT'
- '_README_.hta'
- '_README_.URL'
condition: selection
falsepositives:
- Legitimate readme files in software directories
level: critical
---
title: REvil Registry Persistence Indicator
id: b2c3d4e5-6f7a-8b9c-0d1e-2f3a4b5c6d7e
status: experimental
description: Detects registry key creation or modification consistent with REvil persistence mechanisms observed in UNKN-linked campaigns.
references:
- https://krebsonsecurity.com/2026/04/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/
author: Security Arsenal
date: 2026/04/06
tags:
- attack.persistence
- attack.t1547.001
logsource:
category: registry_add
product: windows
detection:
selection:
TargetObject|contains:
- '\Software\REvil'
- '\Software\Microsoft\Windows\CurrentVersion\RunOnce\'
Details|contains:
- 'decrypt'
- 'restore'
condition: selection
falsepositives:
- Unknown
level: high
KQL (Microsoft Sentinel / Defender)
Hunt for the specific file artifacts and the rapid file modification patterns associated with these ransomware families.
// Hunt for GandCrab and REvil ransom note artifacts
DeviceFileEvents
| where Timestamp > ago(30d)
| where FileName in~ ("GANDCRAB DECRYPTOR.html", "GANDCRAB DECRYPTOR.txt", "_README_.TXT", "_README_.hta")
or FolderPath contains "GANDCRAB"
| project Timestamp, DeviceName, InitiatingProcessAccountName, FileName, FolderPath, SHA256
| extend SuspiciousScore = iff(FileName contains "GANDCRAB" or FileName contains "_README_", 10, 0)
| order by Timestamp desc
Velociraptor VQL
This artifact hunts for the presence of specific ransom notes and checks for the mutex commonly associated with REvil.
-- Hunt for UNKN-linked Ransomware Artifacts
SELECT
FullPath,
Size,
Mtime,
Atime,
Btime
FROM glob(globs=C:/Users/**/*)
WHERE
Name =~ "GANDCRAB.*"
OR Name =~ "_README_.*"
OR Name =~ "*.CRAB"
OR Name =~ "*.GDCB"
-- Hunt for REvil Mutex (requires admin/sysmon)
SELECT
Pid, Name, CommandLine
FROM pslist()
WHERE
Name =~ ".*"
AND grep(query='MsWinZzsCacheLockMutex', string=CommandLine)
Remediation Script (PowerShell)
Use this script to scan for indicators of GandCrab or REvil activity on an endpoint.
<#
.SYNOPSIS
Security Arsenal Incident Response - Scan for UNKN/REvil/GandCrab IOCs.
.DESCRIPTION
Scans file system for specific ransom notes and registry for persistence keys.
#>
Write-Host "[+] Starting scan for REvil/GandCrab IOCs..." -ForegroundColor Cyan
# 1. Scan for Ransom Notes
$paths = @("C:\Users\", "C:\ProgramData\", "D:\")
$indicators = @("*_README_.*", "*GANDCRAB*", "*.CRAB", "*.GDCB")
$found = $false
foreach ($path in $paths) {
if (-not (Test-Path $path)) { continue }
Write-Host "[+] Scanning $path..." -ForegroundColor Gray
foreach ($ind in $indicators) {
try {
$files = Get-ChildItem -Path $path -Filter $ind -Recurse -ErrorAction SilentlyContinue -Force
if ($files) {
$found = $true
foreach ($file in $files) {
Write-Host "[!] THREAT DETECTED: $($file.FullName)" -ForegroundColor Red
}
}
} catch {
# Ignore access denied errors
}
}
}
# 2. Scan Registry for REvil Persistence
Write-Host "[+] Scanning Registry..." -ForegroundColor Gray
$regPaths = @("Registry::\HKEY_CURRENT_USER\Software", "Registry::\HKEY_LOCAL_MACHINE\Software")
foreach ($regPath in $regPaths) {
try {
$keys = Get-ChildItem -Path $regPath -Recurse -ErrorAction SilentlyContinue | Where-Object { $_.Name -like "*REvil*" -or $_.Name -like "*GandCrab*" }
if ($keys) {
$found = $true
foreach ($key in $keys) {
Write-Host "[!] REGISTRY THREAT DETECTED: $($key.Name)" -ForegroundColor Red
}
}
} catch {
# Ignore access denied errors
}
}
if (-not $found) {
Write-Host "[+] No specific IOCs found. System appears clean of these specific artifacts." -ForegroundColor Green
} else {
Write-Host "[!] CRITICAL: IOCs detected. Isolate host immediately and begin IR procedures." -ForegroundColor Red
}
Remediation
Immediate containment and eradication are required if these indicators are found:
- Isolation: Immediately disconnect the infected host from the network (pull ethernet or disable Wi-Fi) to prevent lateral movement. REvil is notorious for spreading via SMB (PsExec/WMI).
- Terminate Malicious Processes: Identify and terminate the process responsible for the encryption. REvil often spawns
svchost.exeorexplorer.exefrom suspicious paths (e.g.,C:\Windows\Temp\). - Remove Persistence:
- Delete the ransom notes (
_README_.TXT, etc.). - Remove the registry keys identified in the hunt script (e.g.,
HKCU\Software\REvil).
- Delete the ransom notes (
- Patch External Facing Services: REvil historically exploited vulnerabilities in VPNs (Pulse Secure, Fortinet) and web servers (Oracle WebLogic, SharePoint). Ensure all external perimeter devices are patched against the "ProxyShell" and "PrintNightmare" families of vulnerabilities.
- Credential Reset: Assume credentials were stolen. Reset all admin and user credentials on the affected segment.
- Restore: Re-image the machine from a known-good backup. Do not attempt to use the decryptor provided by the attackers, even if identified, as analysis suggests failure rates in GandCrab/REvil decryptors are non-trivial.
Related Resources
Security Arsenal Incident Response Services AlertMonitor Platform Book a SOC Assessment incident-response Intel Hub
Is your security operations ready?
Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.