
the staff of the Ridgewood blog
Newark NJ, the Justice Department today announced charges against a Russian national for his involvement in deploying numerous LockBit ransomware and other cyberattacks against victim computer systems in the United States, Asia, Europe, and Africa.
Ruslan Magomedovich Astamirov, 20, (АСТАМИРОВ, Руслан Магомедовичь), of Chechen Republic, Russia, is charged by complaint unsealed today in Newark federal court with conspiring to commit wire fraud and conspiring to intentionally damage protected computers and to transmit ransom demands. Astamirov was arrested on the complaint in Arizona and is scheduled to make his initial appearance in the District of Arizona.
“Astamirov is the third defendant charged by this office in the LockBit global ransomware campaign, and the second defendant to be apprehended,” U.S. Attorney Sellinger said. “The LockBit conspirators and any other ransomware perpetrators cannot hide behind imagined online anonymity. We will continue to work tirelessly with all our law enforcement partners to identify ransomware perpetrators and bring them to justice.”
“This Lockbit-related arrest, the second in six months, underscores the Justice Department’s unwavering commitment to hold ransomware actors accountable,” Deputy Attorney General Lisa O. Monaco said. “In securing the arrest of a second Russian national affiliated with the LockBit ransomware, the department has once again demonstrated the long arm of the law. We will continue to use every tool at our disposal to disrupt cybercrime, and while cybercriminals may continue to run, they ultimately cannot hide.”
“These cyber criminals hide in a virtual world but cause very real harm when they seize control of computer systems, putting companies and customers in an unimaginable bind,” FBI Newark Special Agent in Charge James E. Dennehy said. “Either pay the ransoms or lose control of your entire information technology infrastructure. It is too high a price for anyone to be forced to pay. Astamirov’s arrest, along with the others charged in this case, is a simple but devastating illustration of how we are following through on our promise – we are bringing these hackers to justice.”
According to documents filed in this case:
The LockBit ransomware variant first appeared around January 2020. LockBit actors have executed over 1,400 attacks against victims in the United States and around the world, issuing over $100 million in ransom demands and receiving at least as much as tens of millions of dollars in actual ransom payments made in the form of bitcoin.
In furtherance of his LockBit-related activities, Astamirov owned, controlled, and used a variety of email addresses, Internet Protocol (IP) addresses, and other online provider accounts that allowed him and his co-conspirators to deploy LockBit ransomware and to communicate with their victims. Additionally, in at least one circumstance, law enforcement was able to trace a portion of a victim’s ransom payment to a virtual currency address in Astamirov’s control.
This announcement follows LockBit-related charges in two other cases from the District of New Jersey. In November 2022, the department announced criminal charges against Mikhail Vasiliev, and Canadian national, who is currently in custody in Canada awaiting extradition to the United States. In May 2023, the department announced the indictment of Mikhail Pavlovich Matveev, aka Wazawaka, aka m1x, aka Boriselcin, aka Uhodiransomwar, for his alleged participation in separate conspiracies to deploy LockBit, Babuk, and Hive ransomware variants against victims in the United States and abroad.
The charge of conspiring to intentionally damage protected computers and to transmit ransom demands is punishable by a maximum of five years in prison. The charge of conspiring to commit wire fraud is punishable by a maximum of 20 years in prison. Both charges are also punishable by a maximum fine of either $250,000 or twice the gain or loss from the offense, whichever is greatest.
The FBI Newark Field Office’s Cyber Crimes Task Force is investigating the case. The FBI Phoenix Division, the Jersey City Police Department, New Jersey State Police, Newark IRS Criminal Investigation, and the international partners from Europol’s European Cybercrime Centre, Eurojust, National Police Agency of Japan, France’s Gendarmerie Nationale Cyberspace Command (Cyber Crime Investigation Unit / C3N), National Crime Agency and South West Regional Organized Crime Unit of the United Kingdom, Kantonspolizei Zürich of Switzerland, Landeskriminalamt Schleswig-Holstein and the Bundeskriminalamt of Germany, and Swedish Police Authority of Sweden also provided valuable assistance.
The government is represented by Assistant U.S. Attorneys Andrew M. Trombly, Vinay S. Limbachia, and David E. Malagold of the Cybercrime Unit in Newark and DOJ Trial Attorneys Jessica C. Peck and Jorge Gonzalez of the Computer Crime and Intellectual Property Section.
The charge and allegations contained in the complaint are merely accusations, and the defendant is presumed innocent unless and until proven guilty.
20% off all web services with Spark Driven https://1.sparkdriven.