The U.S. Department of Justice has charged Rostislav Panev, a dual Russian and Israeli national, for his role as a developer of the notorious LockBit ransomware group.
Panev, 51, was arrested in Israel in August following a U.S. provisional arrest request, and he is currently awaiting extradition to the United States.
This action marks a crucial step in the global effort to dismantle ransomware operations and hold accountable those responsible for these sophisticated cyberattacks.
The superseding complaint filed in the District of New Jersey alleges that Panev developed malware and maintained the infrastructure for LockBit, which was once considered the world’s most destructive ransomware group.
Over the years, LockBit has launched devastating attacks on thousands of victims worldwide, including hospitals, schools, critical infrastructure, and multinational corporations, resulting in billions of dollars in damages.


LockBit data leak site
The LockBit Group’s Operations
The LockBit group operates by dividing its members into “developers” and “affiliates.” Developers like Panev are responsible for designing the malware code and maintaining the operational infrastructure.
Meanwhile, affiliates carry out the actual ransomware attacks and negotiate ransom payments from the victims. The group splits these payments among its members.


ransom negotiation conducted within the LockBit control panel
According to court documents, Panev played a pivotal role in the LockBit operations. He admitted to developing code that could disable antivirus software and deploy malware across multiple computers within a victim’s network.
He also confirmed receiving regular cryptocurrency payments for his work, consistent with transactions identified by U.S. authorities.
International Collaboration in the LockBit Investigation
The case against Panev highlights the critical role of international cooperation in combating cybercrime. Law enforcement agencies from multiple countries, including Europol, the United Kingdom, France, and Israel, have collaborated to dismantle the LockBit network.
In February, a coordinated effort led by the U.K.’s National Crime Agency disrupted LockBit’s operations by seizing key infrastructure used by the group.
Other LockBit Members Charged
In addition to Panev, the U.S. has charged six other individuals for their involvement with LockBit. These include alleged primary administrator Dmitry Yuryevich Khoroshev and affiliates Mikhail Vasiliev and Ruslan Astamirov, who have pleaded guilty and are awaiting sentencing.
The U.S. Department of State is offering up to $10 million in rewards for information leading to the arrest and conviction of certain key LockBit members.
Victim Assistance and Decryption Efforts
In response to the LockBit attacks, law enforcement has developed decryption capabilities that may help hundreds of victims recover their encrypted systems.
Victims are encouraged to contact the FBI’s Internet Crime Complaint Center (IC3) to determine if their systems can be decrypted.
The charges against Panev and the broader LockBit group represent a significant milestone in the fight against ransomware. As global authorities continue to collaborate and share intelligence, the barriers to cybercrime become increasingly formidable.
Furthermore, these efforts underscore the importance of international partnerships in combating complex cyber threats and ensuring that cybercriminals are held accountable for their crimes.
Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.