REvil ransomware gang members arrested in international operation
The arrests bring the total number of REvil gang members in custody to seven as law enforcement cracks down on the spate of attacks against businesses


International law enforcement agencies have arrested a number of individuals linked to the REvil ransomware gang and recovered millions in ransom payments.
The latest landmark development in the years-long coordinated effort against ransomware operators saw two arrests made by Romanian authorities on 4 November and a further arrest made in late October by the US Department of Justice (DoJ).
The arrests were announced by Europol and the DoJ on Monday. Interpol, Eurojust, and 17 other countries including the UK were also involved in the internationally coordinated effort known as operation GoldDust.
The two individuals arrested in Romania are both believed to be members of the REvil ransomware gang and responsible for 5,000 ransomware infections which pocketed them around €500,000 (£426,000).
REvil, also known as Sodnokobi, is the group that is believed to have spun off from GandCrab.
A total of seven suspects linked to the REvil and GandCrab gangs have been arrested since February 2021. In addition to the two most recent arrests in Romania, one arrest was made in Europe in October (believed to be the arrest made by the DoJ), three were made in South Korea during three separate stings, and an additional arrest was made in Kuwait on 4 November.
Authorities believe the seven arrested suspects were responsible for 7,000 individual ransomware attacks.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The DoJ's arrest of 22-year-old Ukrainian national Yaroslav Vasinskyi in Poland was also announced on Monday. Believed to be a member of REvil, he is charged with deploying ransomware on a number of US companies, including having a role in the attack on Kaseya in July, and faces a maximum jail sentence of 115 years in the US after he is extradited.
28-year-old Yevgeniy Polyanin, a Russian national, was also indicted by the DoJ for his alleged links to the REvil group and had funds of $6.1 million (£4.5 million) seized after being traceable back to ransomware victims.
According to his indictment, Polyanin faces a maximum of 145 years in jail but is unlikely to face extradition; Russia is famously un-cooperative when surrendering its people to US authorities.
“The arrest of Yaroslav Vasinskyi, the charges against Yevgeniy Polyanin and seizure of $6.1 million of his assets, and the arrests of two other Sodinokibi/REvil actors in Romania are the culmination of close collaboration with our international, U.S. government, and especially our private sector partners,” said FBI Director Christopher Wray. “The FBI has worked creatively and relentlessly to counter the criminal hackers behind Sodinokibi/REvil. Ransomware groups like them pose a serious, unacceptable threat to our safety and our economic well-being.
"We will continue to broadly target their actors and facilitators, their infrastructure, and their money, wherever in the world those might be.” he added.
Operation GoldDust builds upon the Europol-supported, Romanian-led investigation into the GandCrab ransomware family dating back to 2018. The UK and US also supported the work which led to the release of three decryption tools, made available to victims via the No More Ransom Project website, which is believed to have saved attacks on 49,000 businesses and prevented €60 million (£51 million) in ransom payments.
RELATED RESOURCE
The best defence against ransomware
How ransomware is evolving and how to defend against it
Private sector support has also proven invaluable, according to Europol, with cyber security firms such as Bitdefender, Avast, McAffee and KPN all providing technical support to the investigation and decryption tools for No More Ransom.
No More Ransom currently has decryption tools for three versions of GandCrab and for REvil, the latter which has helped 1,400 companies decrypt their networks, saving them almost €475 million (£405 million) in potential losses. The tools made available for both ransomware families have enabled more than 50,000 decryptions, for which cybercriminals had demanded close to €520 million (£443 million) in ransom.
REvil is the prolific ransomware gang behind a spate of high-profile cyber attacks against big businesses over the past few years.
Notable cases include the massive attack on Kaseya and its VSA software which impacted more than 1,500 organisations. A month earlier, it also claimed the attack which halted global meat supplier JBS Foods for a number of days and the hugely disruptive attack on Colonial Pipeline earlier this year.
Following the Kaseya attack, REvil briefly appeared to close it operation before re-appearing in September, putting its 'Happy Blog' back online - a place where the gang names the organisations it attacked but refused to pay the ransom.
In October, it was revealed by Reuters that a multi-country operation led to the hacking of REvil, forcing it offline.
The concerted effort to bring down the gang's website and arrest its affiliates has led some to believe this may be the end for the gang, although it's unlikely to spell the end for ransomware as a business.
"The removal of one criminal gang usually just opens up a niche into which other criminal operators can move – and we don’t expect to see any significant long-term downward trend in ransomware attacks," said Alan Calder, CEO at GRC International Group to IT Pro. "The reality remains that these are very easy attacks to mount - organisational defences are spectacularly lax, and the rewards are lucrative."

Connor Jones has been at the forefront of global cyber security news coverage for the past few years, breaking developments on major stories such as LockBit’s ransomware attack on Royal Mail International, and many others. He has also made sporadic appearances on the ITPro Podcast discussing topics from home desk setups all the way to hacking systems using prosthetic limbs. He has a master’s degree in Magazine Journalism from the University of Sheffield, and has previously written for the likes of Red Bull Esports and UNILAD tech during his career that started in 2015.
-
RSAC Conference 2025: The front line of cyber innovation
ITPro Podcast Ransomware, quantum computing, and an unsurprising focus on AI were highlights of this year's event
-
Anthropic CEO Dario Amodei thinks we're burying our heads in the sand on AI job losses
News With AI set to hit entry-level jobs especially, some industry execs say clear warning signs are being ignored
-
LockBit data dump reveals a treasure trove of intel on the notorious hacker group
News An analysis of May's SQL database dump shows how much LockBit was really making
-
‘I take pleasure in thinking I can rid society of at least some of them’: A cyber vigilante is dumping information on notorious ransomware criminals – and security experts say police will be keeping close tabs
News An anonymous whistleblower has released large amounts of data allegedly linked to the ransomware gangs
-
It's been a bad week for ransomware operators
News A host of ransomware strains have been neutralized, servers seized, and key players indicted
-
Everything we know about the Peter Green Chilled cyber attack
News A ransomware attack on the chilled food distributor highlights the supply chain risks within the retail sector
-
Scattered Spider: Who are the alleged hackers behind the M&S cyber attack?
News The Scattered Spider group has been highly active in recent years
-
Ransomware attacks are rising — but quiet payouts could mean there's more than actually reported
News Ransomware attacks continue to climb, but they may be even higher than official figures show as companies choose to quietly pay to make such incidents go away.
-
Cleo attack victim list grows as Hertz confirms customer data stolen – and security experts say it won't be the last
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
-
‘Phishing kits are a force multiplier': Cheap cyber crime kits can be bought on the dark web for less than $25 – and experts warn it’s lowering the barrier of entry for amateur hackers
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.