Europol arrested a "high value" Russian-Canadian LockBit ransomware operator wanted in connection to high-profile cyber attacks on critical infrastructure and large industrial groups.
Ransomware attack’s main impact to derivative trading thus far has been long delays in processing for financial firms in Europe and the United States, but operations for other ION clients have also been strongly impacted.
LockBit ransomware will undoubtedly be copied and used by other threat actors in the near term, putting the group's business at risk. But the leak of the ransomware builder also gives security researchers valuable insights.
LockBit may have wanted to the hit the headlines following a Mandiant report linking them to Evil Corp, which would mean lost revenue due to US government sanctions.
Accenture said the LockBit ransomware attack that reportedly encrypted at least 2,500 computers and leaked 6 terabytes of data had no impact on its operations.
A joint advisory detailing LockBit ransomware’s tactics and mitigations disclosed that the cybercrime gang extorted $91 million from US companies since 2020 after 1,700 attacks.
LockBit ransomware attack that severely hampered Royal Mail's international delivery system would have cost no less than $70 million, according to chats leaked by the attackers. The original ransom demand was $80 million.
The LockBit ransomware group claims that it was able to penetrate SpaceX via a third party vendor, and is holding some 3,000 engineering design documents that it is threatening to sell.
Hackers demanded $10 million after executing a ransomware attack on a French hospital, disrupting operations and forcing the deferral of appointments and referral of patients to other facilities.
Threat Actors Lurked on a Government Agency Network for 6 Months Before Deploying LockBit Ransomware
A novice hacker lingered on a government agency network for five months before transferring control to an experienced threat actor who deployed LockBit ransomware.