REvil ransomware gang members arrested in international operation
The arrests bring the total number of REvil gang members in custody to seven as law enforcement cracks down on the spate of attacks against businesses
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
International law enforcement agencies have arrested a number of individuals linked to the REvil ransomware gang and recovered millions in ransom payments.
The latest landmark development in the years-long coordinated effort against ransomware operators saw two arrests made by Romanian authorities on 4 November and a further arrest made in late October by the US Department of Justice (DoJ).
The arrests were announced by Europol and the DoJ on Monday. Interpol, Eurojust, and 17 other countries including the UK were also involved in the internationally coordinated effort known as operation GoldDust.
The two individuals arrested in Romania are both believed to be members of the REvil ransomware gang and responsible for 5,000 ransomware infections which pocketed them around €500,000 (£426,000).
REvil, also known as Sodnokobi, is the group that is believed to have spun off from GandCrab.
A total of seven suspects linked to the REvil and GandCrab gangs have been arrested since February 2021. In addition to the two most recent arrests in Romania, one arrest was made in Europe in October (believed to be the arrest made by the DoJ), three were made in South Korea during three separate stings, and an additional arrest was made in Kuwait on 4 November.
Authorities believe the seven arrested suspects were responsible for 7,000 individual ransomware attacks.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The DoJ's arrest of 22-year-old Ukrainian national Yaroslav Vasinskyi in Poland was also announced on Monday. Believed to be a member of REvil, he is charged with deploying ransomware on a number of US companies, including having a role in the attack on Kaseya in July, and faces a maximum jail sentence of 115 years in the US after he is extradited.
28-year-old Yevgeniy Polyanin, a Russian national, was also indicted by the DoJ for his alleged links to the REvil group and had funds of $6.1 million (£4.5 million) seized after being traceable back to ransomware victims.
According to his indictment, Polyanin faces a maximum of 145 years in jail but is unlikely to face extradition; Russia is famously un-cooperative when surrendering its people to US authorities.
“The arrest of Yaroslav Vasinskyi, the charges against Yevgeniy Polyanin and seizure of $6.1 million of his assets, and the arrests of two other Sodinokibi/REvil actors in Romania are the culmination of close collaboration with our international, U.S. government, and especially our private sector partners,” said FBI Director Christopher Wray. “The FBI has worked creatively and relentlessly to counter the criminal hackers behind Sodinokibi/REvil. Ransomware groups like them pose a serious, unacceptable threat to our safety and our economic well-being.
"We will continue to broadly target their actors and facilitators, their infrastructure, and their money, wherever in the world those might be.” he added.
Operation GoldDust builds upon the Europol-supported, Romanian-led investigation into the GandCrab ransomware family dating back to 2018. The UK and US also supported the work which led to the release of three decryption tools, made available to victims via the No More Ransom Project website, which is believed to have saved attacks on 49,000 businesses and prevented €60 million (£51 million) in ransom payments.
RELATED RESOURCE
The best defence against ransomware
How ransomware is evolving and how to defend against it
Private sector support has also proven invaluable, according to Europol, with cyber security firms such as Bitdefender, Avast, McAffee and KPN all providing technical support to the investigation and decryption tools for No More Ransom.
No More Ransom currently has decryption tools for three versions of GandCrab and for REvil, the latter which has helped 1,400 companies decrypt their networks, saving them almost €475 million (£405 million) in potential losses. The tools made available for both ransomware families have enabled more than 50,000 decryptions, for which cybercriminals had demanded close to €520 million (£443 million) in ransom.
REvil is the prolific ransomware gang behind a spate of high-profile cyber attacks against big businesses over the past few years.
Notable cases include the massive attack on Kaseya and its VSA software which impacted more than 1,500 organisations. A month earlier, it also claimed the attack which halted global meat supplier JBS Foods for a number of days and the hugely disruptive attack on Colonial Pipeline earlier this year.
Following the Kaseya attack, REvil briefly appeared to close it operation before re-appearing in September, putting its 'Happy Blog' back online - a place where the gang names the organisations it attacked but refused to pay the ransom.
In October, it was revealed by Reuters that a multi-country operation led to the hacking of REvil, forcing it offline.
The concerted effort to bring down the gang's website and arrest its affiliates has led some to believe this may be the end for the gang, although it's unlikely to spell the end for ransomware as a business.
"The removal of one criminal gang usually just opens up a niche into which other criminal operators can move – and we don’t expect to see any significant long-term downward trend in ransomware attacks," said Alan Calder, CEO at GRC International Group to IT Pro. "The reality remains that these are very easy attacks to mount - organisational defences are spectacularly lax, and the rewards are lucrative."

Connor Jones has been at the forefront of global cyber security news coverage for the past few years, breaking developments on major stories such as LockBit’s ransomware attack on Royal Mail International, and many others. He has also made sporadic appearances on the ITPro Podcast discussing topics from home desk setups all the way to hacking systems using prosthetic limbs. He has a master’s degree in Magazine Journalism from the University of Sheffield, and has previously written for the likes of Red Bull Esports and UNILAD tech during his career that started in 2015.
-
Give businesses more practical AI services and some return on investment before you go selling 6GThe value of modular computing and community-led development wins big at MWC, while AI continues to consume us all
-
Microsoft CEO Satya Nadella says 'anyone can be a software developer' with AINews AI will cause job losses in software development, Nadella admitted, but claimed many will reskill and adapt to new ways of working
-
Ransomware gangs are using employee monitoring software as a springboard for cyber attacksNews Two attempted attacks aimed to exploit Net Monitor for Employees Professional and SimpleHelp
-
Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoingNews Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos
-
Google issues warning over ShinyHunters-branded vishing campaignsNews Related groups are stealing data through voice phishing and fake credential harvesting websites
-
The FBI has seized the RAMP hacking forum, but will the takedown stick? History tells us otherwiseNews Billing itself as the “only place ransomware allowed", RAMP catered mainly for Russian-speaking cyber criminals
-
Everything we know so far about the Nike data breachNews Hackers behind the WorldLeaks ransomware group claim to have accessed sensitive corporate data
-
There’s a dangerous new ransomware variant on the block – and cyber experts warn it’s flying under the radarNews The new DeadLock ransomware family is taking off in the wild, researchers warn
-
Hacker offering US engineering firm data online after alleged breachNews Data relating to Tampa Electric Company, Duke Energy Florida, and American Electric Power was allegedly stolen
-
Cybersecurity experts face 20 years in prison following ransomware campaignTwo men used their tech expertise to carry out ALPHV BlackCat ransomware attacks