Classification of the LockBit breakup

B2B Cyber ​​Security ShortNews

Share post

European and American law enforcement authorities have managed to arrest two members of the notorious LockBit group. This important strike against the ransomware group represents a significant step forward in the fight against organized cybercrime.

LockBit is one of the most well-known threat actors, brazenly attacking hospitals and critical infrastructure itself, unlike many of its competitors. With the arrest of two people and the ongoing investigation against the group's developers and partners, law enforcement authorities are sending a clear message to other malware operators: cybercrime has significant consequences.

Cybercrime groups are increasingly being exposed

The current arrest is just one of many in recent months. It illustrates the positive development in the area of ​​criminal prosecution of cybercriminals. It was only in December that the FBI, together with international law enforcement agencies, seized BlackCat's servers and leak site. Recently, the FBI intercepted the Mooboot malware deployed by Fancy Bear on Ubiquiti routers. The router's firewall was reconfigured to prevent attackers from gaining access again. The FBI's involvement in the effort to take down LockBit shows how proactive the FBI and other law enforcement agencies are against cyber threats.

Taking down the two largest ransomware gangs, LockBit and BlackCat, has the potential to permanently alter the threat landscape by further driving the fragmentation and decentralization of cybercrime groups. This highlights the need for security teams to move away from traditional methods of detecting security breaches based on known Indicators Of Compromise (IOC). An approach that focuses on identifying tactics, techniques, and procedures (TTPs) is more sustainable because it takes into account the dynamic methods of threat actors and emerging threats. (Christian Have, CTO at Logpoint)

More at Logpoint.com

 


About Logpoint

Logpoint is the manufacturer of a reliable, innovative platform for cybersecurity operations. With the combination of advanced technology and a deep understanding of customers' challenges, Logpoint strengthens the capabilities of security teams and helps them combat current and future threats. Logpoint offers SIEM, UEBA, SOAR and SAP security technologies that converge into a complete platform that efficiently detects threats, minimizes false positives, autonomously prioritizes risks, responds to incidents and more.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more