Diamond Member Pelican Press 0 Posted June 7, 2024 Diamond Member Share Posted June 7, 2024 FBI finds 7,000 LockBit decryption keys in ***** to ********* gang The ******* States’ Federal Bureau of Investigation (FBI) has revealed it is in possession of thousands of LockBit ransomware decryption keys, and wants victims of the prolific cyber ********* gang – ***** low in February 2024 in a ***-led sting – to make themselves known if they want help. This is the hidden content, please Sign In or Sign Up at a cyber security conference in Boston, Massachusetts, FBI Cyber Division assistant director Bryan Vorndran said the agency was keen to put its trove of keys to good use, and called on ********* victims to contact the FBI. Victims elsewhere should contact their own national cyber authorities, including the This is the hidden content, please Sign In or Sign Up (NCSC) in the ***. “We now have over 7,000 decryption keys and can help victims reclaim their data and get back online,” said Vorndran. “We are reaching out to known LockBit victims and encouraging anyone who suspects they were a victim to visit our Internet ****** Complaint Center at This is the hidden content, please Sign In or Sign Up .” Developed by a Russian national named Dimitri Khoroshev, who went by online handles including LockBitsupp, Nerowolfe and Putinkrab, LockBit was deployed by various ransomeware-as-a-service (RaaS) actors in more than 2,400 cyber attacks over the years, extorting billions of dollars from victims. Since the operation was infiltrated and disrupted in February, the authorities have been turning Kohoroshev and his minions’ tactics against them, naming and shaming them, and even trolling them online. “[Khoroshev] maintains the image of a shadowy hacker…But really he is a *********, more caught up in the bureaucracy of managing his company than in any covert activities,” taunted Vorndran. “Khoroshev…tried to get us to go easy on him by turning on his competitors, naming other ransomware-as-a-service operators. So, it really is like dealing with organised ****** gangs, where the boss rolls over and asks for leniency. We will not go easy on him.” Raj Samani, senior vice-president and chief scientist at This is the hidden content, please Sign In or Sign Up , commented: “The discovery and release of over 7,000 LockBit decryption keys is another kick in the teeth for the ransomware group and a great win for law enforcement. The likes of LockBit survive and thrive on victims paying ransom demands, therefore, it’s great to see the US government be proactive and prevent this by releasing the decryption keys for free. “Ever since law enforcement took down LockBit’s infrastructure in February 2024, they’ve engaged in PR and damage control to show strength and maintain the confidence of affiliates. However, such announcements by the FBI damages this confidence, and hopefully we’ll soon see the end of the LockBit ransomware group,” he added. Khoroshev’s ********* dealings exposed Khoroshev, who once teased his pursuers by offering a $10m reward to anybody who could successfully doxx him and reveal his true identity, was first officially named as the mastermind behind LockBit, and his persona exposed, in May. At the same time, US authorities announced he was being sanctioned and subjected to a series of asset freezes and travel bans, and charged with 26 offences relating to ******, damage to protected computers and extortion. The Americans are offering a multimillion-dollar reward for information that results in his arrest and extradition. While some core members of the LockBit crew are in custody, unfortunately, due to the breakdown in relations with Russia – where the ****** regime ‘allows’ cyber ********** such as Khoroshev to operate with impunity – it is unlikely he will be convicted any time soon unless he leaves Russia. LockBit attacks continue Although the law enforcement operation against LockBit is widely regarded as a success and has had a visible impact on the ransomware ecosystem, the disruption caused does not mean that the threat of LockBit attacks has receded. Indeed, at-large affiliates of the operation continue to conduct sporadic and occasionally high-profile cyber attacks. Some of the victims to have been hit since the February takedown include the Simone Veil Hospital in Cannes, France, the University of Siena in Italy, and ********* pharmacy chain London Drugs. At the end of April, threat hunters at Proofpoint found evidence that the LockBit 3.0 locker was being This is the hidden content, please Sign In or Sign Up to phishing emails orchestrated through the Phorpiex botnet. These emails, which originated from a persona named ‘Jenny Green’, targeted organisations in multiple industries and appeared to be largely opportunistic in their targeting. The Proofpoint team said that the ******* chain was not especially complex in comparison to what it more usually observes, but the high volume nature of the phishing emails, and the use of ransomware as the first-stage payload, was somewhat unusual – suggesting that the campaign was likely a result of the ***** of LockBit’s builder in 2022. This is the hidden content, please Sign In or Sign Up #FBI #finds #LockBit #decryption #keys #***** #********* #gang This is the hidden content, please Sign In or Sign Up For verified travel tips and real support, visit: https://hopzone.eu/ 0 Quote Link to comment https://hopzone.eu/forums/topic/43663-fbi-finds-7000-lockbit-decryption-keys-in-blow-to-criminal-gang/ Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.