Hello and welcome to the details of Lockbit hackers’ swagger on display after police leak identities online and now with the details
Nevin Al Sukari - Sana'a - A screenshot taken on February 19, 2024 shows a take down notice that a group of global intelligence agencies issued to a dark web site called Lockbit. — Handout via Reuters
WASHINGTON, Feb 21 — One of the world’s biggest criminal hacking gangs woke up yesterday to a startling discovery: Law enforcement, after taking over their main website on Monday, were now threatening to reveal their personal details and data about their cybercrime organisation.
The group, Lockbit, had become notorious in cybercrime circles for using malicious software called ransomware to digitally extort victims, relying on underground marketing campaigns to boost its profile. At one point, Lockbit had promised US$1,000 to anyone who tattooed their logo on themselves, according to cybersecurity researchers.
The group’s ringleader, known by the online moniker “LockbitSupp,” had also become so confident in their own anonymity that, according to Britain’s National Crime Agency (NCA), they had promised US$10 million to the first person who could find and unmask them.
The international law enforcement operation, which had posted on the extortion website on Monday that it had taken control, yesterday announced it had re-engineered Lockbit’s core online system — mimicking the countdown clock that Lockbit used in extortion attempts and posing its own US$10 million challenge, according to a review of Lockbit’s darkweb site.
Advertisement
The core online system was re-engineered to target the hackers in the same way they had terrorised victims: with an advent calendar-like series of tiles, each marked with a countdown timer that, upon reaching zero, published stolen data.
Across the website’s front page, where victim names once stood, law enforcement agencies replaced the text and links with internal data obtained by hacking the hackers themselves.
The resulting display was a smorgasbord of law enforcement action against Lockbit which included indictments, sanctions, a tool with which victims can decrypt their data, and a new countdown with two days left on the clock which asked: “Who is LockbitSupp? The US$10 million question”.
Advertisement
Before it was taken down, Lockbit’s website had displayed an ever-growing gallery of victim organisations that was updated nearly daily. Next to the names were digital clocks showing the number of days left to the deadline given to each organisation to provide ransom payment.
The unique law enforcement operation was the result of a years-long investigation by international police agencies and was designed to undermine the group’s credibility in the criminal underground, officials said.
“Lockbit’s affiliates should be very concerned right now, especially as law enforcement continues to make decryptors available to victims,” said Charles Carmakal, Mandiant Consulting’s chief technology officer.
The United States has charged two Russian nationals with deploying Lockbit ransomware against companies and groups around the world. Police in Poland and Ukraine made two arrests.
Before it was seized by police, Lockbit was able to extort multiple hacking victims at the same time through its website, which listed breached companies next to the countdown timer.
Once the counter expired, the cybercriminals would often publish caches of stolen data from the victimized company — historically, these exposures included personal private information of customers, medical records, internal billing data and the communications of internal staff, among other things.
These leaks were intended to harm the reputation of victims and put them in legal jeopardy, experts told Reuters, netting Lockbit over US$120 million in ransom payments.
Yesterday, Graeme Biggar, director general of the NCA, told journalists that the true cost, including money spent by organisations and corporations scrambling to regain access to their networks and the impact on business, could amounted to losses totalling billions. — Reuters
These were the details of the news Lockbit hackers’ swagger on display after police leak identities online for this day. We hope that we have succeeded by giving you the full details and information. To follow all our news, you can subscribe to the alerts system or to one of our different systems to provide you with all that is new.
It is also worth noting that the original news has been published and is available at Malay Mail and the editorial team at AlKhaleej Today has confirmed it and it has been modified, and it may have been completely transferred or quoted from it and you can read and follow this news from its main source.