REvil / Sodinokibi
Successor to GandCrab. Active 2019–2022 and responsible for some of the largest and most disruptive ransomware incidents in history. Analysis based on 20 negotiation transcripts.
Successor to GandCrab. Active 2019–2022 and responsible for some of the largest and most disruptive ransomware incidents in history. Analysis based on 20 negotiation transcripts.
REvil (also known as Sodinokibi) emerged in April 2019 as the successor to GandCrab, one of the first successful ransomware-as-a-service operations. REvil's operators inherited significant technical expertise and criminal infrastructure from GandCrab, and rapidly established REvil as one of the most capable and financially successful ransomware operations of the 2019–2022 period.
REvil operated a selective RaaS model, carefully vetting affiliates through an application process and maintaining a smaller, higher-quality affiliate base compared to more open platforms. The group's "Happy Blog" leak site published victim data and served as a key pressure mechanism. REvil pioneered several tactics that subsequently became standard practice across the ransomware ecosystem, including double extortion (simultaneous encryption and data theft), auctioning victim data to competitors, and DDoS attacks against victim networks as additional pressure.
The group went dark in July 2021 following the Kaseya attack and resulting US government pressure. It briefly re-emerged in September 2021 but shut down permanently in January 2022 following coordinated law enforcement action by the US, Russia, Ukraine, and other countries. Russian authorities arrested several REvil members in January 2022 at the request of the US government — a historically unusual instance of Russian law enforcement action against domestic cybercriminals.
REvil's primary initial access vectors evolved throughout its operational period:
REvil's encryptor was written in C and was technically sophisticated. Key characteristics:
REvil was known for some of the highest initial ransom demands in the industry. The group operated a tiered payment structure through their Tor-based victim portal: a standard ransom for the decryptor, and a "delete data" fee to prevent publication on their Happy Blog leak site. These were sometimes priced separately, creating additional negotiation complexity.
Initial demands in our 20-transcript archive ranged from $500,000 to $70 million (the Kaseya demand was $70M for a universal decryptor). REvil's negotiators were known for maintaining high demands and resisting significant reductions, though the data shows reductions of 40–60% were achievable in many cases, particularly for smaller victims who could demonstrate inability to pay.
Key negotiation characteristics observed across our transcript data:
REvil faced significant law enforcement pressure following the Kaseya attack. In November 2021, the US Department of Justice unsealed charges against Yaroslav Vasinskyi (Ukrainian national, arrested in Poland) and Yevgeniy Polyanin (Russian national, charged in absentia) for their roles in REvil attacks. $6.1M in funds traceable to Polyanin were seized.
In January 2022, Russian authorities — acting on US government information sharing — arrested 14 alleged REvil members and seized approximately $6.5M in cash and cryptocurrency, multiple luxury vehicles, and computer equipment. This represented a historically unusual instance of Russian law enforcement action against its own cybercriminals.
All 20 REvil negotiation transcripts are available in our public archive, covering the group's 2019–2021 operational period.
| Status | DEFUNCT |
| Active Period | April 2019 – January 2022 |
| Also Known As | Sodinokibi |
| Transcripts | 20 |
| Demand Range | $500K – $70M |
| Model | Selective RaaS, Double Extortion |
| Successor To | GandCrab |
| Arrests | Jan 2022 (Russia, Ukraine) |
| Tone | Business-like, high-pressure |
| Initial Demands | Among highest in sector |
| Negotiability | Moderate (40–60% reductions seen) |
| Timeline Pressure | High (price-doubling deadlines) |
| Insurance Awareness | High — calibrated to policies |
REvil's techniques and personnel influenced many successor groups. If you're responding to a high-demand ransomware incident, our team can provide expert negotiation and technical support.
Get Emergency Help