• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
lockbit ransomware's darknet domains seized in global law enforcement raid

LockBit Ransomware’s Darknet Domains Seized in Global Law Enforcement Raid

You are here: Home / General Cyber Security News / LockBit Ransomware’s Darknet Domains Seized in Global Law Enforcement Raid
February 20, 2024

An intercontinental regulation enforcement procedure has led to the seizure of many darknet domains operated by LockBit, a person of the most prolific ransomware groups, marking the newest in a extended record of digital takedowns.

Though the comprehensive extent of the energy, codenamed Procedure Cronos, is presently unidentified, checking out the group’s .onion site shows a seizure banner that contains the information “The web page is now below the manage of regulation enforcement.”

Authorities from 11 nations around the world, Australia, Canada, Finland, France, Germany, Japan, the Netherlands, Sweden, Switzerland, the U.K., and the U.S., alongside Europol participated in the joint training.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

Malware exploration group VX-Underground, in a message posted on X (previously Twitter), explained the websites were being taken down by exploiting a critical security flaw impacting PHP (CVE-2023-3824, CVSS rating: 9.8) that could final result in remote code execution.

Law enforcement agencies also remaining on a take note on the affiliate panel, stating they are in possession of the “resource code, particulars of the victims you have attacked, the total of funds extorted, the details stolen, chats, and considerably, much much more,” introducing it was manufactured feasible due to LockBit’s “flawed infrastructure.”

LockBit, which emerged on September 3, 2019, has been 1 of the most energetic and notorious ransomware gangs in historical past, proclaiming additional than 2,000 victims to date. It’s estimated to have extorted at minimum $91 million from U.S. companies by yourself.

According to data shared by cybersecurity company ReliaQuest, LockBit shown 275 victims on its knowledge leak portal in the fourth quarter of 2023, dwarfing all its rivals.

Cybersecurity

There is no word as yet of any arrest or sanctions, but the advancement is a definite blow to LockBit’s close to-time period operations and comes two months after the BlackCat ransomware procedure was dismantled by the U.S. government.

The coordinated takedown also coincides with the arrest of a 31-12 months-outdated Ukrainian national for attaining unauthorized obtain to Google and on line bank accounts of American and Canadian people by deploying malware and promoting obtain to other menace actors on the dark web for money obtain.

Found this article exciting? Abide by us on Twitter  and LinkedIn to examine much more special articles we submit.


Some areas of this article are sourced from:
thehackernews.com

Previous Post: «meta warns of 8 spyware firms targeting ios, android, and Meta Warns of 8 Spyware Firms Targeting iOS, Android, and Windows Devices
Next Post: Iran and Hezbollah Hackers Launch Attacks to Influence Israel-Hamas Narrative iran and hezbollah hackers launch attacks to influence israel hamas narrative»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk

Copyright © TheCyberSecurity.News, All Rights Reserved.