USA V Ruslan Magomedovich Astamirov
USA V Ruslan Magomedovich Astamirov
USA V Ruslan Magomedovich Astamirov
I, Kenneth Manning, being duly sworn, state the following is true and
correct to the best of my knowledge and belief:
SEE ATTACHMENT A
SEE ATTACHMENT B
___________________________________________________
Kenneth Manning
Special Agent
Federal Bureau of Investigation
Special Agent Kenneth Manning attested to this
Affidavit by telephone pursuant to FRCP 4.1(b)(2)(A).
1
Case 2:23-mj-13114-LDW Document 1 Filed 06/13/23 Page 2 of 13 PageID: 2
ATTACHMENT A
COUNT 1
(Conspiracy to Commit Fraud and Related Activity in
Connection with Computers – 18 U.S.C. § 371)
did knowingly and intentionally conspire and agree with others to commit
offenses against the United States, that is:
b. to knowingly and with intent to extort from any person any money
and thing of value, transmit in interstate and foreign commerce any
communication containing a threat to obtain information from a protected
computer without authorization and to impair the confidentiality of information
obtained from a protected computer without authorization and by exceeding
authorized access, and a demand and request for money and other thing of value
in relation to damage to a protected computer, where such damage was caused
to facilitate the extortion, contrary to Title 18, United States Code, Section
1030(a)(7)(B), (a)(7)(C), and (c)(3)(A).
2
Case 2:23-mj-13114-LDW Document 1 Filed 06/13/23 Page 3 of 13 PageID: 3
COUNT 2
(Conspiracy to Commit Wire Fraud – 18 U.S.C. § 1349)
did knowingly and intentionally conspire and agree with others to devise a
scheme and artifice to defraud, and to obtain money and property by means of
materially false and fraudulent pretenses, representations, and promises, and
for the purpose of executing such scheme and artifice to defraud, to transmit
and cause to be transmitted by means of wire communications in interstate
and foreign commerce, writings, signs, signals, and sounds, contrary to Title
18, United States Code, Section 1343.
3
Case 2:23-mj-13114-LDW Document 1 Filed 06/13/23 Page 4 of 13 PageID: 4
ATTACHMENT B
4
Case 2:23-mj-13114-LDW Document 1 Filed 06/13/23 Page 5 of 13 PageID: 5
ransomware and then recruit affiliates to deploy it. The affiliates, in turn,
identify vulnerable computer systems, unlawfully access those systems,
and deploy on those systems the ransomware designed by the developers.
When victims make ransom payments after successful ransomware
attacks, the developers and the affiliates each take a share of those
payments.
1Many virtual currencies publicly record all of their transactions on what is known as a
blockchain. The blockchain is essentially a distributed public ledger, run by the decentralized
network of computers, containing an immutable and historical record of every transaction
utilizing that blockchain’s technology. The blockchain can be updated multiple times per hour
and records every virtual currency address that has ever received that virtual currency and
maintains records of every transaction and all the known balances for each virtual currency
address. There are different blockchains for different types of virtual currencies. The Bitcoin
blockchain and the Ethereum network are the most popular blockchains to date.
While the identity of a virtual currency address owner is generally anonymous, law enforcement
can identify the owner of a particular virtual currency address by analyzing the blockchain (e.g.,
the Bitcoin blockchain). The analysis can also reveal additional addresses controlled by the same
individual or entity. In addition to using publicly available blockchain explorers, law enforcement
uses commercial services offered by several different blockchain-analysis companies to
investigate virtual currency transactions. These companies analyze virtual currency blockchains
and attempt to identify the individuals or groups involved in transactions. Through numerous
unrelated investigations, law enforcement has found the information provided by these tools to
be reliable.
5
Case 2:23-mj-13114-LDW Document 1 Filed 06/13/23 Page 6 of 13 PageID: 6
6
Case 2:23-mj-13114-LDW Document 1 Filed 06/13/23 Page 7 of 13 PageID: 7
7
Case 2:23-mj-13114-LDW Document 1 Filed 06/13/23 Page 8 of 13 PageID: 8
7. During the May 13, 2023 interview, FBI agents asked ASTAMIROV
whether he had any familiarity with or knowledge of Email-A. ASTAMIROV
initially denied any knowledge of that email address. Later during the interview,
however, ASTAMIROV retracted this claim, admitting that he was indeed familiar
with the email address but claiming that it belonged to his brother, not to him.
8
Case 2:23-mj-13114-LDW Document 1 Filed 06/13/23 Page 9 of 13 PageID: 9
control over that email account further proves his involvement in the LockBit
conspiracy.
12. As explained above, law enforcement has determined that IP-A was
used in furtherance of the LockBit and other cybercriminal attacks against at
9
Case 2:23-mj-13114-LDW Document 1 Filed 06/13/23 Page 10 of 13 PageID: 10
least four victims from as early as in or around August 2020 through at least as
recently as in or around November 2021: Victim-1, in or around August 2020;
Victim-2, in or around September 2020; Victim-3, in or around October 2020;
and Victim-4, in or around November 2021.
15. Records obtained from Provider-A show that the Provider-A Email-B
Account was accessed from IP-A approximately 14 times between in or around
August 2020, and in or around September 2020. One of these accesses occurred
at around 6:16:31 UTC on or about August 26, 2020.
16. Records obtained from Provider-A show that the Provider-A Email-A
Account was also accessed from IP-A on or about August 26, 2020, at around
6:15:52 UTC—less than one minute before the Provider-A Email-B Account was
accessed on that day from the same IP address.
18. Based on these facts and my training and experience, this close IP
overlap demonstrates that the same individual—whom I believe to be
ASTAMIROV—controlled both Provider-A accounts at that time.
19. Moreover, records produced by Provider-A also show that both the
Provider-A Email-B Account and the Provider-A Email-A Account are linked by
“cookie.” A cookie, in this context, is a small parcel of information stored on a
phone, computer, or other electronic device by a website. Linkage by cookie
indicates that two accounts—here, the two Provider-A accounts at issue—were
accessed at some point from the same electronic device. Based on my training
and experience, this linkage further demonstrates that the Provider-A Email-B
Account and the Provider-A Email-A Account were controlled by the same
individual, whom I believe to be ASTAMIROV.
10
Case 2:23-mj-13114-LDW Document 1 Filed 06/13/23 Page 11 of 13 PageID: 11
24. Specifically, law enforcement has learned that after the Victim-5
LockBit attack, Victim-5 initiated ransom negotiations with the LockBit
perpetrators through the LockBit control panel. After the victim and
perpetrators had agreed on a ransom amount, the perpetrators provided the
victim with two Bitcoin addresses: one address (the “Affiliate Ransom Address”)
to send 80 percent of the total ransom amount (the “Victim-5 Affiliate Ransom
Amount”), and a different address to send the remaining 20 percent of the total
ransom amount. Based on evidence gathered in this investigation and my
training and experience, I believe that the 80 percent sent to the Affiliate Ransom
Address was meant by the perpetrators as the affiliate portion, and the remaining
20 percent was meant as the developer portion.
11
Case 2:23-mj-13114-LDW Document 1 Filed 06/13/23 Page 12 of 13 PageID: 12
26. Approximately 3.5 hours later, the Affiliate Ransom Address sent
virtually all of the Victim-5 Affiliate Ransom Amount to another Bitcoin address
(“Address-1”). Immediately after Address-1 received that amount, Address-1
sent virtually all of those funds to another Bitcoin address (“Address-2”). In
other words, Address-2 received virtually all—more than 99.99 percent—of the
Victim-5 Affiliate Ransom Amount approximately 3.5 hours after that payment
was made.
30. First, as explained above, LockBit members use the LockBit control
panel to conduct their criminal LockBit activities—for example, to generate
custom-built LockBit payloads to deploy on victim computer systems and to
communicate with victims. Based on training, experience, and investigation, I
know that ASTAMIROV would have had to use the LockBit control panel to
conduct the LockBit attacks discussed above. And ASTAMIROV, like all LockBit
members, would have known full well that that control panel, like all other
LockBit facilities (such as the LockBit Data Leak Site), was operated on
commonly shared LockBit servers and other infrastructure. ASTAMIROV, like
all LockBit members, would have further known that the 20 percent developer
portion of each successful ransom payment would be used, in part, to pay for
the maintenance of this infrastructure.
12
Case 2:23-mj-13114-LDW Document 1 Filed 06/13/23 Page 13 of 13 PageID: 13
33. The same global conspiracy, operating in largely the same way, has
targeted numerous victims inside the District of New Jersey since LockBit first
appeared, including both multiple LockBit victims that have paid a ransom and
LockBit victims that have refused to pay a ransom, leading LockBit perpetrators
to post their exfiltrated data on the LockBit Data Leak Site.
13