• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

LockBit Makes $91m From US Victims in Two Years

You are here: Home / General Cyber Security News / LockBit Makes $91m From US Victims in Two Years
June 15, 2023

The notorious LockBit ransomware variant has built extortionists close to $100m from US victims on your own because January 2020, allied security agencies disclosed in a new advisory yesterday.

The US Cybersecurity and Infrastructure Security Agency (CISA), UK National Cyber Security Centre (NCSC) and their Australian, New Zealand, Canadian, French and German equivalents penned the doc after warning of the continued menace posed by the collective.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


In simple fact, they claimed LockBit was the most deployed ransomware of 2022 and proceeds to be prolific to this day. It has accounted for all over 1700 attacks in the US by itself because 2020, the document noted.  

Study extra on LockBit: LockBit Dominates Ransomware Campaigns in 2022: Deep Intuition.

Given that January 2020, affiliate marketers of the ransomware-as-a-company outfit have targeted corporations of varying measurements and in many critical infrastructure sectors, including economical companies, foodstuff and agriculture, schooling, vitality, govt and unexpected emergency companies, health care, manufacturing and transportation, the organizations mentioned.

The advisory offered technical facts on how the ransomware and its leak web page have advanced in excess of time, which include the freeware and open-resource applications usually used in article-intrusion action, CVEs exploited and how secondary ransomware attacks get the job done when upstream source chain victims are specific.

There is also a handy record of MITRE ATT&CK methods and procedures, mitigations and means for further more looking at.

Paul Chichester, NCSC director of operations, warned that LockBit activity has experienced popular implications.

“It is essential for companies to realize the serious repercussions that ransomware attacks can have on their operations, funds and name,” he additional.

“This advisory, issued with our international companions, emphasises the worth of network defenders having the proposed actions to create productive protections versus such attacks.”

The news comes as the deadline imposed by the Clop gang on victims of its MOVEit information theft extortion marketing campaign handed yesterday.

According to ReliaQuest, the group named its very first batch of 12 victims yesterday, despite the fact that the threat intelligence firm claimed no stolen information had been released on the leak web-site at the time of writing.


Some pieces of this write-up are sourced from:
www.infosecurity-magazine.com

Previous Post: «lockbit ransomware extorts $91 million from u.s. companies LockBit Ransomware Extorts $91 Million from U.S. Companies
Next Post: Microsoft Warns of New Russian State-Sponsored Hacker Group with Destructive Intent microsoft warns of new russian state sponsored hacker group with destructive»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.