• Tue. Oct 10th, 2023

LockBit 3.0 Leak Revealed

Avatar photo

ByEsme Greene

Sep 22, 2023
LockBit 3.0 Leak Revealed
Esme Greene
Latest posts by Esme Greene (see all)

Recently, Kaspersky Lab discovered instances of its clients being attacked with LockBit ransomware with materially altered ransom demands.

LockBit Continues: New Faces, Familiar Threats, and Growing Concerns

Attackers deployed a new message on behalf of a previously unidentified organization named NATIONAL HAZARD AGENCY in place of the standard ransom text. It provided contacts for getting in touch with the attackers by Tox or email right once, as well as a predetermined price of $3 million for decrypting the data.

The same cybercriminals who profited from the LockBit 3.0 constructor leak from the previous year are continuing to do so. hackers Bl00dy and Buhti, as an example.

396 distinct LockBit samples, 312 of which were made using the disclosed constructor, have already been found by experts. In 77 instances, the LockBit organization was not even mentioned in the ransom message.

The default builder setup was largely used in several of the adjustments. Only seldom did hackers alter a few small settings, which shows that the majority of attackers were impatient or lazy.

Because they enable online criminals of all skill levels to produce and disseminate their own versions of well-known threats, leaked malware tools are always risky.

Following such instances, businesses should exercise extra caution and pay particular attention to safeguarding corporate networks, regular software upgrades, and data backups.

 
Avatar photo

Esme Greene

Esme brings a wealth of knowledge and experience to our website, specializing in all aspects of DarkWeb security. With a deep understanding of the intricate workings of the DarkWeb and its associated cybersecurity risks, Esme curates insightful and informative content for our readers.