Germany's Federal Criminal Police Office (aka BKA or the Bundeskriminalamt) has unmasked the real identity of the main threat actors associated with the now-defunct REvil (aka Sodinokibi ) ransomware-as-a-service (RaaS) operation. The threat actor, who went by the alias UNKN , functioned as a representative of the group, advertising the ransomware in June 2019 on the XSS cybercrime forum. He has now been identified as Daniil Maksimovich Shchukin , a 31-year-old Russian national. The Hacker News is the main source layer for now, and the rest should be read as a signal that is still widening. In security, the real value is not just the warning itself but the way it changes operational risk, account safety, and the cost of responding later.
Advertising slot
Patrick Tech Store Accounts, tools, and software now available in the store This slot is temporarily dedicated to the Patrick Tech ecosystem.What is happening now
Germany's Federal Criminal Police Office (aka BKA or the Bundeskriminalamt) has unmasked the real identity of the main threat actors associated with the now-defunct REvil (aka Sodinokibi ) ransomware-as-a-service (RaaS) operation. The Hacker News form the main source layer behind the core facts in this piece.
Where the sources line up
The Hacker News is the main source layer for now, and the rest should be read as a signal that is still widening. The threat actor, who went by the alias UNKN , functioned as a representative of the group, advertising the ransomware in June 2019 on the XSS cybercrime forum. The Hacker News form the main source layer behind the core facts in this piece.
Advertising slot
Patrick Tech Store Accounts, tools, and software now available in the store This slot is temporarily dedicated to the Patrick Tech ecosystem.The details worth keeping
He has now been identified as Daniil Maksimovich Shchukin , a 31-year-old Russian national. In security, the real value is not just the warning itself but the way it changes operational risk, account safety, and the cost of responding later.
Why this matters most
The signal is strong enough to deserve attention, but it still needs to be read as something developing rather than fully settled. With 1 source layers on the table, the part worth reading most closely is where firm facts meet the market's early reaction. He also went by the online monikers Oneiilk2, Oneillk2, Oneillk22, and GandCrab.
What to watch next
The next layer to watch is scope, patch speed, and the operating cost if teams are forced to change process because of this story. Patrick Tech Media will keep checking rollout speed, user reaction, and how The Hacker News update the next pieces. From 1 early signals, the piece keeps 1 references that are useful for locking the main details in place.
Source notes
- The Hacker News pressGlobal
From Patrick Tech
Contextual tools
Secure Access Kit for Small Teams
Suggested tools for safe sign-in, account governance, and access handoff.
Open Patrick Tech StoreCommunity
What did you think of this story?
Drop a reaction or leave a comment right below the article.
Related stories
I tested the 'survival computer' that has all the offline utility you need
Information could wind up being the most sought-after commodity, the difference between survival and, well, not. If...
$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation
Drift has revealed that the April 1, 2026, attack that led to the theft of $285 million was the culmination of a...
CBP facility codes sure seem to have leaked via online flashcards: why this signal...
A user on Quizlet, an online learning platform, created a public flashcard set in February that appears to have...
Latest comments
0No comments yet. You can start the conversation.