A comeback from Lockbit is likely

B2B Cyber ​​Security ShortNews

Share post

It is fundamentally important for Lockbit to be visible again quickly. Victims are presumably less willing to pay as long as there are rumors that the group is no longer operational.

“It has now become known that Lockbit, contrary to its own statements, does not delete the stolen data. One more reason to stand firm and not pay in the event of blackmail. They have set up a new .onion leak site. The group claims there that the investigating authorities used a PHP vulnerability for the takedown. This is a PR campaign. Lockbit wants to put the damage of the takedown into perspective and show strength. According to its own information, Lockbit was compromised via an unknown PHP vulnerability. Only servers running PHP were compromised. The statement seems implausible for two reasons: If they don't know exactly how they were compromised, how can they be sure it was through PHP? The statement about the affected servers sounds like communication damage limitation or is simply wishful thinking.

The investigative authorities' action was extremely comprehensive and targeted the three things that constitute the true strength of a ransomware-as-a-service brand: the brand itself, the partner organizations that carry out the operations and, last but not least, the group's financial assets . The strike against the group on the dark web was supported by massive actions in the real world, such as arresting people who work with Lockbit. The seized website was used by the investigative authorities to send a warning message directly to the partners, the Lockbit leak site and the Lockbit brand were used to mock and denigrate Lockbit and partner organizations. In addition, the investigative authorities say they confiscated more than 200 wallets with cryptocurrencies and more than 1.000 decryption codes.

Lockbit is protected from prosecution

Unfortunately, two things suggest that Lockbit could make a comeback: Many members are likely based in Russia or Russia-friendly former Soviet states and are thus protected from international law enforcement authorities. In addition, the investigative authorities have placed a $15 million bounty on information that leads to the identification of the leaders of the Lockbit group - which suggests that they unfortunately do not currently know these people." (Rüdiger Trost, cybersecurity expert at WithSecure)

More at WithSecure.com

 


About WithSecure

WithSecure, formerly F-Secure Business, is the trusted partner in cyber security. IT service providers, managed security services providers and other companies trust WithSecure - as do large financial institutions, industrial companies and leading communication and technology providers. With its results-oriented approach to cyber security, the Finnish security provider helps companies to put security in relation to operations and to secure processes and prevent business interruptions.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more