The U.S. has successfully completed the extradition of a suspected LockBit ransomware developer who was apprehended last year. Rostislav Panev, a 51-year-old individual with dual Russian and Israeli citizenship, was arrested in Israel based on a provisional arrest request from the U.S. Last week, the U.S. Department of Justice (DOJ) confirmed that Panev has been extradited to the United States to face charges related to his involvement with the LockBit ransomware group.
After appearing in court before U.S. Magistrate Judge André M. Espinosa, Panev was remanded in custody pending trial. U.S. Attorney John Giordano emphasized the significance of Panev’s extradition, stating that it sends a clear message to members of the LockBit ransomware conspiracy that they will be pursued and brought to justice. He further asserted the unwavering commitment of the U.S. prosecutors, FBI, Criminal Division, and international law enforcement partners to prosecute cybercriminals, despite the evolving tactics used by these individuals.
As the LockBit ransomware group attempts to make a comeback following a year of heightened global law enforcement efforts, Panev’s extradition marks a significant milestone in the ongoing crackdown on such cybercriminal activities. Court documents and official statements indicate that Panev has been a developer for the LockBit ransomware group since its inception in 2019 until at least February 2024.
During his tenure with the group, Panev and his accomplices managed to expand LockBit’s operations, making it one of the most active and destructive ransomware entities worldwide. The LockBit group reportedly victimized over 2,500 entities across 120 countries, including 1,800 victims in the U.S. According to data from cybersecurity experts at Cyble, LockBit has maintained a dominant presence in the ransomware landscape, with its victim count far surpassing that of other competing groups.
Despite their criminal success, the LockBit group faced a setback in 2022 when an ill-conceived attack on the Toronto Hospital for Sick Children resulted in a public apology from the group, accompanied by the release of a decryptor for affected victims. This incident drew increased scrutiny from law enforcement agencies and further highlighted the malicious activities undertaken by ransomware groups like LockBit.
Overall, LockBit managed to extort over $500 million in ransom payments from victims and caused economic losses amounting to billions of dollars, as per the DOJ’s findings. The group operated through a structured framework involving developers, like Panev, who crafted the malware code and infrastructural support, and affiliates who carried out the attacks and extorted ransom payments from victims.
Moreover, the evidence against Panev included the discovery of crucial digital assets on his computer, such as admin credentials for an online repository on the dark web containing LockBit source code and operational tools. Additionally, Panev’s alleged interactions with the primary LockBit administrator, Dmitry Yuryevich Khoroshev, and the crypto transfers made to Panev’s account further incriminated him in the ransomware group’s illicit activities.
The extradition of Panev adds to the growing list of charged individuals linked to the LockBit ransomware group in the District of New Jersey. While some suspects have already pled guilty and await sentencing, others remain at large, with substantial bounties offered for their apprehension. The global collaborative efforts against ransomware groups like LockBit signal a collective resolve to combat cybercrime and hold perpetrators accountable for their actions.

