Threat Actor Characterization
You’re viewing the read-only version.
Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Rostislav Panev
ID: d28b94a961d1d4733d0fdeb9d1774fce
Cybercrime
Cybercriminal
Threat types: Ransomware, RaaS
Progress: 67%
Completeness: 66%
Freshness: 70%
Operation zone: —
Aliases
Limited alias preview
| Panev | — | — | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
confidence: medium-high
Rostislav Panev is publicly charged as a developer of the LockBit ransomware group. His profile represents a platform/core enablement role in a RaaS ecosystem, supporting capability that affiliates deploy. Official reporting covers arrest in Israel (Aug 2024), charging (Dec 2024), and extradition to the U.S. (Mar 2025). Mapping below emphasizes platform-enabled behaviors and extortion lifecycle rather than single-incident execution details.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1587.001 | Malware | TA0042 |
|
| T1486 | Data Encrypted for Impact | TA0040 |
|
| T1041 | Exfiltration Over C2 Channel | TA0010 |
|
| T1567.002 | Exfiltration to Cloud Storage | TA0010 |
|
| T1654 | Log Enumeration | TA0007 |
|
Executive brief
now
Saved successfully.
Hunting Playbook — Rostislav Panev (LockBit platform context)
Scope: Although Panev is described as a developer, defenders need detection for the LockBit ecosystem behaviors the platform enables. This playbook focuses on the most durable, cross-affiliate mid-chain signals.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Hunting Playbook
now
Saved successfully.
IOC Appendix
now
Saved successfully.
OSINT Library
now
Saved successfully.