Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert
Zero fees, no slippage
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
US Charges Dual Russian-Israeli National in Connection with LockBit Ransomware Group

US Charges Dual Russian-Israeli National in Connection with LockBit Ransomware Group

CryptoNewsCryptoNews2024/12/21 01:55
By:Hassan Shittu

U.S. authorities have charged a dual Russian-Israeli national for his role in the LockBit ransomware group, seeking extradition after his arrest in Israel for developing ransomware tools and conducting global cyber attacks.

Last updated:
December 20, 2024 13:50 EST

U.S. authorities have charged Rostislav Panev, a dual Russian and Israeli national, for his alleged involvement with the LockBit ransomware group.

The Department of Justice (DOJ) announced the charges on Friday and seeks Panev’s extradition. U.S. Attorney Philip R. Sellinger unsealed the criminal complaint in the District of New Jersey on December 20.

LockBit Ransomware Tools Developer Arrested in Israel: Panev Awaits Extradition to the U.S

US Charges Dual Russian-Israeli National in Connection with LockBit Ransomware Group image 1

Rostislav Panev, 51, was arrested in Israel in August following a U.S. request for provisional arrest with the intent of extradition.

Panev, identified as a key developer for the LockBit group, remains in custody in Israel as extradition proceedings continue.

Panev is accused of developing and maintaining LockBit’s tools to conduct ransomware attacks worldwide.

He also allegedly develops malware to disable antivirus protections, infiltrate victim networks, and print ransom notes on connected devices.

Law enforcement also found evidence linking Panev to cryptocurrency payments exceeding $230,000, which he had allegedly received for his work with the group.

LockBit has been linked to numerous ransomware attacks targeting high-profile organizations. Victims include Boeing Co., the Industrial Commercial Bank of China, and the UK Royal Mail.

Ransomware attacks by groups like LockBit typically involve hackers encrypting victims’ data or disabling systems. Victims are then forced to pay a ransom to regain access.

Panev’s lawyer, Sharon Nahari, stated that Panev worked as a professional software developer. She claimed Panev communicated with LockBit via Telegram and created tools for the group without knowing their intended use.

Nahari added that Panev has cooperated with law enforcement and provided information about his involvement.

Authorities have intensified their efforts against LockBit in recent months. In February, U.S. and UK law enforcement agencies seized servers and websites used by the group and its affiliates.

Investigators also recovered victim data and thousands of decryption keys. Officials urged affected victims to contact them for assistance in recovering stolen information.

The $10 Million Manhunt: Who Is LockBit’s Alleged Operator, Dmitry Khoroshev?

LockBit, a ransomware group active since 2019, has attacked over 2,500 victims in 120 countries, including 1,800 in the U.S. Its targets span healthcare, education, critical infrastructure, and government sectors.

Affiliates use malware to encrypt networks, demanding ransoms and threatening to leak stolen data.

Global law enforcement, including U.S. authorities, Israel, France, the U.K., and Europol, have intensified efforts to dismantle the group.

The U.K. National Crime Agency disrupted LockBit’s infrastructure earlier this year, seizing vital websites and servers.

Seven alleged members have been charged since 2023, including Russian citizen Mikhail Matveev, who was linked to the LockBit, Hive, and Babuk ransomware.

In February 2024, “Operation Cronos” hacked LockBit’s systems, recovering data, affiliate lists, and over 7,000 decryption keys. These keys helped victims bypass ransom payments.

This year, additional charges were filed against Russian nationals Artur Sungatov, Ivan Kondratiev, and Dmitry Khoroshev, known as “putinkrab,” LockBit’s alleged operator.

A $10 million reward is offered for Khoroshev’s capture.

Notably, in July, affiliates Ruslan Astamirov and Mikhail Vasiliev pleaded guilty.

LockBit remains a key focus for law enforcement, with ongoing international cooperation to dismantle its operations.

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Locked for new tokens.
APR up to 10%. Always on, always get airdrop.
Lock now!