Accenture said the LockBit ransomware attack that reportedly encrypted at least 2,500 computers and leaked 6 terabytes of data had no impact on its operations.
A novice hacker lingered on a government agency network for five months before transferring control to an experienced threat actor who deployed LockBit ransomware.
LockBit may have wanted to the hit the headlines following a Mandiant report linking them to Evil Corp, which would mean lost revenue due to US government sanctions.
The LockBit gang is the latest ransomware-as-a-service outfit to push the envelope, this time by offering the criminal underworld's first known bug bounty program.
The Italian National Cybersecurity Agency and the Postal Police are investigating an alleged ransomware attack on the country's tax agency that potentially leaked 100 GB of data.
Hackers demanded $10 million after executing a ransomware attack on a French hospital, disrupting operations and forcing the deferral of appointments and referral of patients to other facilities.
LockBit ransomware will undoubtedly be copied and used by other threat actors in the near term, putting the group's business at risk. But the leak of the ransomware builder also gives security researchers valuable insights.
Europol arrested a "high value" Russian-Canadian LockBit ransomware operator wanted in connection to high-profile cyber attacks on critical infrastructure and large industrial groups.
Ransomware attack’s main impact to derivative trading thus far has been long delays in processing for financial firms in Europe and the United States, but operations for other ION clients have also been strongly impacted.
LockBit ransomware attack that severely hampered Royal Mail's international delivery system would have cost no less than $70 million, according to chats leaked by the attackers. The original ransom demand was $80 million.