Security

Cyber-crime

Suspected LockBit dev, facing US extradition, 'did it for the money'

Dual Russian-Israeli national arrested in August


An alleged LockBit ransomware developer is in custody in Israel and awaiting extradition to the United States.

Israeli law enforcement arrested Rostislav Panev, 51, a dual Russian and Israeli national, in August at the request of the US.

Panev faces 41 counts, including computer-related extortion, conspiracy to commit fraud, conspiracy to commit wire fraud, and intentional damage to a protected computer, according to a criminal complaint [PDF] filed in the District of New Jersey that was unsealed on December 20.

With the addition of Panev, seven LockBit members have been charged with crimes and three have been arrested.

"We started this year with a coordinated international disruption of LockBit – the most damaging ransomware group in the world," Deputy Attorney General Lisa Monaco said in a statement. "Fast forward to today and three LockBit actors are in custody thanks to the diligence of our investigators and our strong partnerships around the world."

LockBit, the notorious ransomware gang that began infecting victims around January 2020, more or less ended with the UK-led disruption and website seizure in February, followed by the unmasking of the crew's alleged kingpin, Dmitry Yuryevich Khoroshev, aka LockBitSupp.

The feds unsealed an indictment against Khoroshev in May, and he currently has a $10 million bounty on his head.

While the scumbags still claim victims and have even teased a new version of their malware, the criminal operation is a shadow of its former self.

In total, the criminals infected more than 2,500 victims in at least 120 countries, including 1,800 in the US, according to the Justice Department. The group's affiliates extorted at least $500 million in ransom payments from their victims and caused billions of dollars in other losses.

From the group's inception around 2019 through February 2024, Panev worked as a LockBit developer, according to the criminal complaint.

At the time of his arrest in August, Israeli cops reportedly searched Panev's computer and discovered credentials for a Git repository that contained source code for LockBit's ESXi, Linux, Proxmox, and Nutanix builders; source code for the Conti ransomware variant; source code for the StealBit custom data exfiltration tool; and a copy of the LockBit 3.0 ransom note.

The complaint says they also found access credentials for the LockBit control panel on Panev's machine:

Notably, the panel accessed with PANEV's credentials also included a handle to communicate with that LockBit user on 'Service-1,' a decentralized, end-to-end encrypted messaging platform. Specifically, the listed Service-1 handle was 'FUCKFBI' followed by other characters.

Prior to his arrest, US authorities say they obtained evidence showing that Panev exchanged direct messages with Khoroshev on a darkweb forum identified as "Forum-1," during which the two discussed work that needed to be done on the LockBit builder and control panel.

Between June 2022 and February 2024, Khoroshev made a series of payments to Panev, laundered through various cryptocurrency mixing services, of about $10,000 per month, the court documents allege.

After he was arrested in August, Panev "agreed to multiple voluntary interviews with Israeli authorities," the complaint says. During those interviews, he reportedly admitted his correspondence with LockBit began around 2019 and he performed several coding jobs for the gang in exchange for compensation.

"Those jobs included, among other things, writing code to disable the Windows Defender antivirus system (presumably, to allow a malware payload, like a LockBit build, to be deployed on a victim computer); writing code to deploy malware throughout a network via the Windows Active Directory service; and writing code to print a given text on all printers on a given network (presumably, the LockBit ransom note)," according to the criminal complaint.

Later during his tenure, Panev admitted to writing code for LockBit's encryption malware and providing technical guidance to the gang, and that's when the monthly $10,000 payments began rolling in.

But in perhaps our favorite part of the 48-page court document, Panev allegedly told the Israeli authorities that at first he didn't realize the work he was doing for LockBit was illegal.

"Panev claimed – dubiously, in the assessment of US authorities, given the nature of the services he acknowledged providing from the very beginning of his work for LockBit and his own extensive familiarity with computer science, hacking, and cybercrime, as discussed in this Affidavit – that he at first did not realize that the work he was doing for LockBit was unlawful," it reads.

Later, however, he did catch on to the fact that he was providing code for a criminal operation, but "admitted that he continued working for the LockBit group, in sum and substance, 'for the money.'" ®

Send us news
18 Comments

Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days

'Codefinger' crims on the hunt for compromised keys

Atos denies Space Bears' ransomware claims – with a 'but'

Points finger at third-party infrastructure being breached

Miscreants 'mass exploited' Fortinet firewalls, 'highly probable' zero-day used

Ransomware 'not off the table,' Arctic Wolf threat hunter tells El Reg

UK floats ransomware payout ban for public sector

Stronger proposals may also see private sector applying for a payment 'license'

Medusa ransomware group claims attack on UK's Gateshead Council

Pastes allegedly stolen documents on leak site with £600K demand

Mitel 0-day, 5-year-old Oracle RCE bug under active exploit

3 CVEs added to CISA's catalog

Chinese cyber-spies peek over shoulder of officials probing real-estate deals near American military bases

Gee, wonder why Beijing is so keen on the – checks notes – Committee on Foreign Investment in the US

How cops taking down LockBit, ALPHV led to RansomHub's meteoric rise

Cut off one head, two more grow back in its place

Russia's Star Blizzard phishing crew caught targeting WhatsApp accounts

FSB cyberspies venture into a new app for espionage, Microsoft says

China's Salt Typhoon spies spotted on US govt networks before telcos, CISA boss says

We are only seeing 'the tip of the iceberg,' Easterly warns

FBI wipes Chinese PlugX malware from thousands of Windows PCs in America

Hey, Xi: Zài jiàn!

Microsoft sues 'foreign-based' cyber-crooks, seizes sites used to abuse AI

Scumbags stole API keys, then started a hacking-as-a-service biz, it is claimed