LockBit ransomware will undoubtedly be copied and used by other threat actors in the near term, putting the group's business at risk. But the leak of the ransomware builder also gives security researchers valuable insights.
The LockBit gang is the latest ransomware-as-a-service outfit to push the envelope, this time by offering the criminal underworld's first known bug bounty program.
LockBit may have wanted to the hit the headlines following a Mandiant report linking them to Evil Corp, which would mean lost revenue due to US government sanctions.
Threat Actors Lurked on a Government Agency Network for 6 Months Before Deploying LockBit Ransomware
A novice hacker lingered on a government agency network for five months before transferring control to an experienced threat actor who deployed LockBit ransomware.
The LockBit ransomware group claims that it was able to penetrate SpaceX via a third party vendor, and is holding some 3,000 engineering design documents that it is threatening to sell.
Hackers demanded $10 million after executing a ransomware attack on a French hospital, disrupting operations and forcing the deferral of appointments and referral of patients to other facilities.
Europol arrested a "high value" Russian-Canadian LockBit ransomware operator wanted in connection to high-profile cyber attacks on critical infrastructure and large industrial groups.
LockBit ransomware attack that severely hampered Royal Mail's international delivery system would have cost no less than $70 million, according to chats leaked by the attackers. The original ransom demand was $80 million.
Ransomware attack’s main impact to derivative trading thus far has been long delays in processing for financial firms in Europe and the United States, but operations for other ION clients have also been strongly impacted.
Accenture said the LockBit ransomware attack that reportedly encrypted at least 2,500 computers and leaked 6 terabytes of data had no impact on its operations.