On Friday, December 20, 2024, the U.S. DOJ charged Rostislav Panev, a dual Russian-Israeli national, as a LockBit ransomware developer. Arrested in Israel, he awaits extradition to the U.S.
By searching the name "Rostislav Panev" in leaked data, we identified the email acidjamm@gmail.com appearing in two leaks.
At this stage, there's no confirmation that it belongs to "our Rostislav Panev".
By searching the email acidjamm@gmail.com in leaked data, we uncovered additional details:
- Passwords: Several passwords associated with this email
- Phone: +79255540757
- Username: @acidjamm
@acidjamm It also reveals an address in Moscow: г. Москва, Рублевское шоссе, д. 50, кв. 94.
The emias_ru leak provided the confirmation we needed, revealing a date of birth: 1973-05-05. This aligns perfectly with the age of 51 mentioned in the DOJ press release.
The intriguing detail comes from the username acidjamm, which links to a YouTube channel.
This channel has uploaded videos using a robotic voice, suggesting the entire operation was likely automated.
Another confirmation: the profile picture of the "Talking Talking" YouTube channel matches the profile picture of the Google account associated with acidjamm@gmail.com.
Searching his Cyrillic name "Панев Ростислав" revealed his INN, phone numbers, birthplace ДОНЕЦК, and once again confirmed his birth date!
Finally, searching his name on Odnoklassniki, a major Russian social network, led us to his complete profile: . ok.ru/profile/539604…
The last post on the profile dates back to 2012. One photo, for instance, was taken on Leopld ha-Sheni St, Acre, Israel.
- Yes, we have identified the correct individual, and he is aware of it. He has attempted to delete evidence since the publication of the tweet.
- Again, it’s not a one-man job. We have also identified the other members of the team.
- They are aware of it. They sent 500 million requests to predictasearch.com over the last three days.
- Trust the process. A report has been sent to the concerned authorities, and they will do their excellent work as usual.
They created a new Telegram channel. The last post they forwarded is from a channel called "Russian Partisan." This is not surprising according to our initial findings.
I've identified the people responsible for the DDoS attack on X yesterday. I'm currently in Washington and will be at the Eisenhower Building tomorrow (for another matter). Would you be interested in meeting?
In the meantime, let me explain
It's OSINT time!
@elonmusk Yesterday, a group called "Dark Storm Team" claimed responsibility for a DDoS attack on Twitter.
Their leader, MRHELL112 on Telegram, has previously used usernames like Darkcrr, GLITCHAT1, and GLITCHcracker.
@elonmusk In a Telegram channel about "DDoS Attack Services," DrSinaway is mentioned alongside Darkcrr.
DrSinaway’s TG bio also references a group called CyberSorcerers.
Après avoir dit que le texte est trop large un tweet plus haut on parle “des services” ? Il n’y avait pas un mot plus large dans le dictionnaire de la French Tech ?
Non il n’y a pas de backdoor qui respecte les libertés et la vie privée. C’est un MENSONGE.