• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
lockbit ransomware operation shut down; criminals arrested; decryption keys released

LockBit Ransomware Operation Shut Down; Criminals Arrested; Decryption Keys Released

You are here: Home / General Cyber Security News / LockBit Ransomware Operation Shut Down; Criminals Arrested; Decryption Keys Released
February 20, 2024

The U.K. Nationwide Crime Company (NCA) on Tuesday verified that it acquired LockBit’s source code as nicely as intelligence pertaining to its pursuits and their affiliate marketers as component of a committed activity drive named Procedure Cronos.

“Some of the data on LockBit’s units belonged to victims who experienced paid out a ransom to the danger actors, evidencing that even when a ransom is paid, it does not assure that facts will be deleted, despite what the criminals have promised,” the agency claimed.

It also introduced the arrest of two LockBit actors in Poland and Ukraine. Over 200 cryptocurrency accounts connected to the group have been frozen. Indictments have also been unsealed in the U.S. towards two other Russian nationals who are alleged to have carried out LockBit attacks.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Artur Sungatov and Ivan Gennadievich Kondratiev (aka Bassterlord) have been accused of deploying LockBit versus numerous victims through the U.S., which include companies nationwide in the manufacturing and other industries, as perfectly as victims around the earth in the semiconductor and other industries, for each the U.S. Department of Justice (DoJ).

Cybersecurity

Kondratyev has also been charged with three felony counts arising from his use of the Sodinokibi, also acknowledged as REvil, ransomware variant to encrypt info, exfiltrate victim details, and extort a ransom payment from a company target based mostly in Alameda County, California.

The improvement will come in the aftermath of an global disruption marketing campaign targeting LockBit, which the NCA described as the “world’s most damaging cyber crime group.”

As aspect of the takedown efforts, the company claimed it took manage of LockBit’s services and infiltrated its total felony organization. This consists of the administration atmosphere employed by affiliate marketers and the community-experiencing leak web site hosted on the dark web.

In addition, 34 servers belonging to LockBit affiliates have also been dismantled and far more than 1,000 decryption keys have been retrieved from the confiscated LockBit servers.

LockBit Ransomware Operation Shut Down

LockBit, considering that its debut in late 2019, runs a ransomware-as-a-services (RaaS) plan in which the encryptors are accredited to affiliate marketers, who carry out the attacks in exchange for a minimize of the ransom proceeds.

The attacks comply with a tactic identified as double extortion to steal sensitive details prior to encrypting them, with the risk actors implementing strain on victims to make a payment in purchase to decrypt their data files and stop their information from currently being revealed.

LockBit Ransomware Operation Shut Down

“The ransomware team is also notorious for experimenting with new approaches for pressuring their victims into having to pay ransoms,” Europol claimed.

“Triple extortion is one these types of approach which consists of the common solutions of encrypting the victim’s details and threatening to leak it, but also incorporates dispersed denial-of-company (DDoS) attacks as an additional layer of force.”

Cybersecurity

The info theft is facilitated by means of a personalized facts exfiltration device codenamed StealBit. The infrastructure, which was made use of to manage and transfer victim data, has because been seized by authorities from a few international locations, counting the U.S.

According to Eurojust and DoJ, LockBit attacks are believed to have influenced around 2,500 victims all around the world and netted a lot more than $120 million in illicit gains. A decryption tool has also been produced offered by using No Much more Ransom to recuperate data files encrypted by the ransomware at no cost.

“As a result of our near collaboration, we have hacked the hackers taken command of their infrastructure, seized their resource code, and received keys that will enable victims decrypt their systems,” NCA Director Standard Graeme Biggar reported.

“As of today, LockBit are locked out. We have destroyed the ability and most notably, the reliability of a team that depended on secrecy and anonymity. LockBit might find to rebuild their prison organization. However, we know who they are, and how they work.”

Observed this short article fascinating? Follow us on Twitter  and LinkedIn to study additional unique content material we post.


Some sections of this write-up are sourced from:
thehackernews.com

Previous Post: «new malicious pypi packages caught using covert side loading tactics New Malicious PyPI Packages Caught Using Covert Side-Loading Tactics
Next Post: New Migo Malware Targeting Redis Servers for Cryptocurrency Mining new migo malware targeting redis servers for cryptocurrency mining»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.