Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 928

REvil / Sodinokibi

What is REvil / Sodinokibi?

REvil / SodinokibiA Russian-speaking ransomware-as-a-service operation active 2019-2021, known for double extortion and the high-impact Kaseya VSA supply-chain attack.


REvil, also called Sodinokibi, emerged in April 2019 and was widely considered a successor to GandCrab. It operated as a RaaS in which affiliates kept 60-70 percent of ransoms and used aggressive tactics including auctions of stolen data and large public demands. Notable victims include Travelex (December 2019), JBS Foods (May 2021, paid 11 million USD), and Kaseya VSA in July 2021, when an MSP-side zero-day allowed REvil to push the encryptor to roughly 1,500 downstream organisations in one of the largest supply-chain ransomware events. In late 2021, US, EU and Russian authorities executed arrests, infrastructure takedowns and indictments. Russia's FSB announced arrests in January 2022, although operational restarts and rebrands have been reported intermittently since.

Examples

  1. 01

    The Kaseya VSA supply-chain attack in July 2021 propagated REvil to about 1,500 downstream MSP customers.

  2. 02

    JBS Foods reportedly paid REvil 11 million USD in May 2021 to recover meat-processing operations.

Frequently asked questions

What is REvil / Sodinokibi?

A Russian-speaking ransomware-as-a-service operation active 2019-2021, known for double extortion and the high-impact Kaseya VSA supply-chain attack. It belongs to the Defense & Operations category of cybersecurity.

What does REvil / Sodinokibi mean?

A Russian-speaking ransomware-as-a-service operation active 2019-2021, known for double extortion and the high-impact Kaseya VSA supply-chain attack.

How does REvil / Sodinokibi work?

REvil, also called Sodinokibi, emerged in April 2019 and was widely considered a successor to GandCrab. It operated as a RaaS in which affiliates kept 60-70 percent of ransoms and used aggressive tactics including auctions of stolen data and large public demands. Notable victims include Travelex (December 2019), JBS Foods (May 2021, paid 11 million USD), and Kaseya VSA in July 2021, when an MSP-side zero-day allowed REvil to push the encryptor to roughly 1,500 downstream organisations in one of the largest supply-chain ransomware events. In late 2021, US, EU and Russian authorities executed arrests, infrastructure takedowns and indictments. Russia's FSB announced arrests in January 2022, although operational restarts and rebrands have been reported intermittently since.

How do you defend against REvil / Sodinokibi?

Defences for REvil / Sodinokibi typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for REvil / Sodinokibi?

Common alternative names include: Sodinokibi, REvil RaaS.

Related terms