FBI, Europol, NCA: APT group LockBit smashed!

Advertising

Share post

According to the authorities, Europol, the FBI and the British NCA have dismantled the APT group LockBit. At least it has all darknet leak sites under control and is probably already distributing decryption tools. The authorities even used the system of leak sites to distribute information and tools.

It sounds too good to be true: A global network of authorities such as the FBI, Eruopol, NCA and many more have succeeded in striking a significant blow against the APT group LockBit. Officially, the group's network has been dismantled, the servers taken over, source codes and documents confiscated and even all leak sites taken over. According to a report from the British National Crime Agency (NCA). The NCA has taken control of LockBit's primary management environment, which allowed its partners to create and carry out attacks, as well as the group's publicly accessible leak site on the dark web, where it hosted and shared data previously stolen from victims which had threatened to be published.

Advertising

Leak sites are now helping victims

LockBit leak page

🔎 The authorities have not blocked the LockBit leak page on the darknet, but are using it as an information platform (Image: B2B-CS).

Typically, a group's leak pages are simply blocked after the arrest. But that's different now: the website now displays a range of information about LockBit's capabilities and processes. However, the whole thing is supposed to be a help for the victims. There you will find information about contact points, help after payment, decryption keys and links to tools with decryption tools. The transferred page with the information can now be found at this gate address: to the LockBit page (onion address).

Victim data still available despite promise to delete

The authorities have access to the LockBit Group's entire administration system. These are the leak sites and their controls, as well as the chat in which negotiations were held with the victims. The entire data management of the data extracted from victims is also in the hands of the authorities, including the source code of the malware and the affiliate platform for partners of the LockBit Group. One of the most interesting finds is stolen data where the victims had paid the ransom. LockBit had repeatedly promised that the data would be deleted after a payment. But gangsters are gangsters.

Advertising

Data exfiltration tool and server confiscated

LockBit had a custom data exfiltration tool called Stealbit that was used by partners to steal victim data. Authorities seized this infrastructure from members of the Op Cronos task force located in three countries, and 28 servers belonging to LockBit subsidiaries were also shut down. At the same time, the first people who are said to have worked with LockBit have already been arrested in Poland and Ukraine. According to Europol, 200 Bitcoin accounts have also been frozen.

More at Europol.Europa.eu

 

Matching articles on the topic

Cyber ​​insurance is the exception

If important data suddenly disappears after a malware attack, someone else takes possession of your identity on the Internet ➡ Read more

SMEs: Ransomware remains the No. 1 attacker

The new MDR report evaluates incident response incidents at SMEs - medium-sized companies in 2024 and shows that attacks with ransomware ➡ Read more

Modern CIOs have diverse tasks

The role of modern CIOs has changed significantly: In the past, CIOs were primarily responsible for maintaining companies’ IT operations. ➡ Read more

Over 130.000 data breaches in Europe in 2024

In the 15 European nations, there were over 2024 data breaches every day in 365, according to the results of a recent analysis. In Germany ➡ Read more

LockBit leak site hacked and data stolen

Now LockBit has also become the victim of another hacker: It seems that not only the leak page of the group was hacked, but ➡ Read more

DDoS attacks: the most important means of cyber warfare

In the second half of 2024, there were at least 8.911.312 DDoS attacks worldwide, according to the results of a recent DDoS Threat Intelligence Report. ➡ Read more

Cybercrime: Russian-speaking underground is leading

A new research report provides a comprehensive insight into the Russian-speaking cyber underground, an ecosystem that has fueled global cybercrime in recent ➡ Read more

Cyber ​​Resilience Act: Companies should act now

The Cyber ​​Resilience Act (CRA) is coming in leaps and bounds. This means that manufacturers will soon no longer be able to ➡ Read more