Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » LockBit developer Rastislav Panev fined for billions in ransomware damages
Global Security

LockBit developer Rastislav Panev fined for billions in ransomware damages

AdminBy AdminDecember 21, 2024No Comments6 Mins Read
LockBit Developer
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Developed by LockBit

A dual citizen of Russia and Israel has been indicted in the United States for allegedly being the developer of the now-defunct LockBit ransomware-as-a-service (RaaS) operation from its inception in 2019 or around February 2024.

Rostislav Panev51, was arrested in Israel earlier this August and is currently awaiting extradition, the US Department of Justice (DoJ) said in a statement. Based on transfers to a cryptocurrency wallet owned by Panev, he allegedly earned about $230,000 between June 2022 and February 2024.

“For years, Rostislav Panev created and maintained a digital weapon that allowed his associates at LockBit to wreak havoc and cause billions of dollars in damage around the world,” US Attorney Philip R. Selinger said.

The infrastructure of LockBit, one of the most effective ransomware groups, was seized in February 2024 as part of an international law enforcement operation called Cronos. It gained notoriety for targeting more than 2,500 organizations in at least 120 countries around the world, including 1,800 in the US alone.

The victims of LockBit’s attacks have been individuals and small businesses, multinational corporations such as hospitals, schools, non-profit organizations, critical infrastructure, and government and law enforcement agencies. RaaS is believed to have generated at least $500 million in illegal profits for the group.

Court documents show Panev’s computer, analyzed after his arrest, had administrator credentials for an online vault hosted on the dark web that contained the source code for multiple versions of the LockBit builder, which affiliates used to create their own ransomware builds.

Credentials to access the LockBit control panel and the tool named were also found StealBitwhich allowed affiliated entities to steal sensitive data from compromised hosts before the encryption process began.

Cyber ​​security

Panev, in addition to writing and maintaining the code for the LockBit malware and offering technical advice to the cybercriminal group, is also accused of exchanging direct messages with Dmitry Yuryevich Khoroshevthe main admin, who also went by the internet alias LockBitSupp, discussing the work on the builder and control panel.

“In an interview with Israeli authorities after his arrest in August, Panev admitted that he performed coding, development and consulting work for the LockBit group and that he received regular payments in cryptocurrency for this work,” the Justice Department said.

“Among the work Panev admitted to doing for the LockBit group was developing code to disable anti-virus software; to deploy malware on multiple computers connected to the victim’s network; and to print a LockBit ransom note on all printers connected to the victim. network”.

With the latest arrest, a total of seven LockBit members – Mikhail Vasiliev, Ruslan Astamirov, Artur Sungatov, Ivan Gennadyevich Kondratiev, Mikhail Pavlovich Matveev – were accused in the USA

Despite​​​​these operational setbacks, LockBit operators look like this planning a returnwith the new version LockBit 4.0 scheduled for February 2025. However, it remains to be seen whether the extortion group will be able to successfully stage a comeback in light of the current wave of liquidations and accusations.

The second partner of the Netwalker extortionists gets 20 years in prison

The development comes after Daniel Cristian Hulea, the 30-year-old Romanian affiliate of the NetWalker ransomware operation, was sentenced to 20 years in prison and forfeited $21,500,000, as well as his shares in an Indonesian company and a luxury resort, which was financed from the proceeds. obtained illegally from attacks.

Hulea previously pleaded guilty in the US to charges of conspiracy to commit computer fraud and conspiracy to commit wire fraud in June 2024. He was arrested in Romania on July 11, 2023 and later extradited to the United States

“As part of the plea agreement, Hulea admitted that he used NetWalker to obtain approximately 1,595 bitcoins as ransom for himself and a co-conspirator, valued at approximately $21,500,000 at the time of payment,” the DOJ said in a statement. said.

The NetWalker ransomware operation has particularly singled out the healthcare sector in the midst of the COVID-19 pandemic. It was disassembled online in January 2021, when U.S. and Bulgarian authorities seized dark web sites used by the group. In October 2022, the Canadian branch of Sebastien Vachon-Dejardins was awarded up to 20 years in prison.

The developer of Raccoon Stealer was sentenced to 5 years in prison

In related law enforcement news, the Ministry of Justice also announced the sentence to Mark Sokolovsky, a citizen of Ukraine. accused being the primary developer of the Raccoon Stealer malware, to 60 months in federal prison on one count of conspiracy to hack into a computer.

The 28-year-old conspired to offer Raccoon Infostealer as a Malware-as-a-Service (MaaS) to other criminals for $200 a month, who then deployed the malware on victims’ systems, using various tricks such as phishing emails to steal sensitive data. The collected information was used to commit financial crimes or sold to others on underground forums.

Sokolovsky, who was extradited from the Netherlands in February 2024. pleaded guilty in the crime in early October and agreed to forfeit $23,975 and pay at least $910,844.61 in restitution.

“Mark Sokolowski was a key player in an international criminal conspiracy that victimized countless people by administering malware that made it cheaper and easier even for hobbyists to commit sophisticated cybercrimes,” said U.S. Attorney Jaime Esparza for the Western District of Texas.

Cyber ​​security

This was reported by the US Federal Bureau of Investigation (FBI). create a website where users can check if their email address appears in the data stolen by the Raccoon stealer malware. Operation MaaS was shut down in March 2022 at the same time as Sokolowski was arrested by Dutch authorities.

A man from New York received almost 6 years in prison for trading credit cards and money laundering

The last steps are also in progress sentencing Vitaly Antonenko, a 32-year-old New York resident, served multiple days for participating in a criminal scheme that infiltrated systems using SQL injections to steal credit card and personal information and offer the data for sale to criminal online marketplaces.

“After the co-conspirator sold the data, Antonenko and others used Bitcoin, as well as traditional banking and money laundering operations, to disguise the nature, location, source, ownership and control of the proceeds,” the Justice Department said in May 2020. “The victims of the conspiracy were a hotel business and a non-profit research institution located in eastern Massachusetts.”

Antonenko was there arrested in March 2019 upon returning to the United States from Ukraine with “computers and other digital media containing hundreds of thousands of stolen payment card numbers.”

In September 2024 he pleaded guilty one count each of conspiracy to gain unauthorized access to computer networks and control of unauthorized access devices and one count of conspiracy to commit money laundering.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.