The Dark Web's Ransomware Kingpin: How LockBit's Reign Led to a Global Manhunt

BLOGS

Winston.I

9/24/20244 min read

In a quiet suburban home in Bradford, Canada, a man sits in his garage, staring at his laptop. To the casual observer, it looks like an ordinary evening, but what lies on his screen is far from ordinary. Running on that laptop is a program capable of generating millions of dollars—illegally. As he taps away, unaware of the police cars gathering outside, his involvement in a massive international cybercrime operation is about to come crashing down.

This is the story of LockBit, one of the world’s most notorious ransomware groups, and the hunt for the mastermind behind it.

What is LockBit?

LockBit is a sophisticated ransomware-as-a-service (RaaS) group that began making waves in 2019. Unlike traditional hackers, LockBit didn’t just carry out attacks on its own. Instead, they sold access to their ransomware program to other hackers, known as affiliates, who would use it to extort businesses worldwide. In exchange, LockBit would take a cut of the profits. This "business model" made LockBit wildly successful, netting millions of dollars from companies, healthcare institutions, and even governments.

The group’s software would encrypt victims' files and demand payment in cryptocurrency, often threatening to leak sensitive data if the ransom wasn’t paid. They didn’t work alone—LockBit’s affiliates were responsible for infecting systems, while the LockBit operation pocketed a percentage of the ransom payments. Over the years, LockBit evolved into one of the most feared and prolific ransomware groups on the planet, pulling in over $500 million from victims and causing billions of dollars in damages.

The Arrest of a Pawn

On the night the police stormed the house in Canada, they weren’t there for the head of LockBit but one of its many affiliates. Mel Vasilev, a Russian-Canadian citizen, had been helping spread LockBit’s ransomware, targeting businesses for huge payouts. But Vasilev was just a cog in the machine.

The real target of the international manhunt was the elusive figure known as LockBitSupport, the man believed to be the brains behind the operation. But tracking down the mastermind behind a global cybercrime syndicate wasn’t going to be easy.

The Rise of LockBit

LockBitSupport, whose real name is Dmitry Kev, didn’t start off as a kingpin. In fact, when he first appeared on the dark web forums in 2020, he was relatively unknown. Dmitry had started as a small-time hacker, but he had grand ambitions. He invested heavily in promoting LockBit on Russian-speaking hacking forums, even depositing thousands of dollars to build trust with other cybercriminals. He knew that reputation was everything in the dark web’s underground economy.

His big break came when he introduced LockBit as a "ransomware-as-a-service" (RaaS). This was a game changer in the world of cybercrime. Instead of selling his malware outright, he allowed other hackers to use it, sharing the profits. It was like franchising crime. This innovative model not only made him a fortune but also created a network of affiliates, many of whom became key players in some of the world’s most notorious cyberattacks.

How LockBit Took Over

LockBit became a household name in the world of ransomware by constantly evolving. When the original software had flaws, Dmitry recruited top developers to fix them, ultimately creating LockBit 2.0. This version was faster, harder to detect, and far more effective at locking down files. LockBit 2.0 even introduced a sinister new feature—stealing data before encrypting it, which allowed the hackers to extort companies by threatening to release sensitive information if they didn’t pay up.

As LockBit continued to grow, so did its list of victims. Some of the world’s biggest companies, including Royal Mail, SpaceX, and Boeing, fell victim to LockBit’s attacks. But it wasn’t just big businesses; hospitals and healthcare institutions were hit too, including Children’s Hospitals, where lives were put at risk due to ransomware-caused system outages.

Despite its horrific consequences, LockBitSupport and his team kept pushing the envelope. They even launched outrageous marketing campaigns, offering cash prizes to hackers and promoting contests in dark web forums.

The Fall of LockBit

In 2022, the global law enforcement community decided enough was enough. A coordinated operation, dubbed Operation Kronos, began to dismantle LockBit’s infrastructure and arrest its affiliates. The FBI, Europol, and other agencies had been tracking LockBit for years, waiting for the right moment to strike.

In one of the operation’s most dramatic moves, law enforcement agencies hacked LockBit’s own website, taking control of its dark web portal. They posted a taunting message: “Who is LockBitSupport? The $10 million question.” It was a bold statement, as the FBI began offering millions in rewards for information leading to the capture of LockBit’s leaders.

Though the arrest of Vasilev and other affiliates was a victory, the real question remained: Who was the mastermind behind it all?

Unmasking the Mastermind

After years of evading law enforcement, Dmitry Kev was finally identified as LockBitSupport, the mastermind behind LockBit. Through a combination of digital breadcrumbs, sloppy operational security, and sheer persistence, investigators linked Dmitry to his online alias.

As it turned out, Dmitry wasn’t living an extravagant criminal lifestyle. He drove a modest Mercedes and spent much of his time in relative anonymity. But once his identity was leaked, the FBI placed a $10 million bounty on his head.

Despite this, Dmitry remains at large, protected by Russian laws that prevent extradition. Unless he makes a misstep, like traveling abroad, he may never face justice. But even though LockBit’s leader remains free, the ransomware empire he built is crumbling.

The Legacy of LockBit

Today, LockBit is a shadow of its former self. Many affiliates have abandoned ship, and law enforcement continues to dismantle its operations piece by piece. Yet, Dmitry’s creation will likely be remembered as one of the most destructive ransomware groups in history.

LockBitSupport enjoyed playing the role of the villain, boasting of his exploits and taunting law enforcement. But in the end, his ego may have been his undoing.

Conclusion

The story of LockBit and its leader, Dmitry Kev, is a chilling reminder of the damage that can be done from behind a computer screen. As the dark web continues to breed new cybercriminals, the world must stay vigilant. LockBit may have fallen, but the next ransomware group could be lurking in the shadows, ready to strike.