{"id":23983,"date":"2024-02-28T10:57:22","date_gmt":"2024-02-28T18:57:22","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2024\/02\/28\/news-17713\/"},"modified":"2024-02-28T10:57:22","modified_gmt":"2024-02-28T18:57:22","slug":"news-17713","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/02\/28\/news-17713\/","title":{"rendered":"Law enforcement trolls LockBit, reveals massive takedown"},"content":{"rendered":"\n<p>In an act of exquisite trolling, the UK&#8217;s National Crime Agency (NCA) has announced further details about its <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/02\/lockbit-the-worlds-worst-ransomware-is-down\">disruption of the LockBit ransomware group<\/a> by using the group&#8217;s own dark web website.<\/p>\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img decoding=\"async\" loading=\"lazy\" width=\"1400\" height=\"1106\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/02\/lockbit-leak-site-2024-02-20.jpg?w=1024\" alt=\"The LockBit website after its redecoration by the NCA\" class=\"wp-image-104783\" style=\"width:700px\" \/><figcaption class=\"wp-element-caption\">The LockBit dark web site has a new look<\/figcaption><\/figure>\n<p>Since the <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/06\/conti-ransomware-disappears-did-it-fake-its-own-death\">demise of Conti<\/a> in 2022, LockBit has been unchallenged as the most prolific ransomware group in the world. In the last 12 months it has racked up more than two and half times as many known attacks as its closest rival. That all stopped yesterday, though, when the LockBit site was replaced with a banner decorated with the flags and badges of the countries and agencies that cooperated to &#8220;disrupt&#8221; it. The banner read:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>This site is now under the control of The National Crime Agency of the UK, working in close cooperation with the FBI and the international law enforcement task force, \u2018Operation Cronos\u2019.<\/p>\n<\/blockquote>\n<p>It also promised more information would be revealed today at 11:30 GMT. It didn&#8217;t disappoint. There was a <a href=\"https:\/\/www.nationalcrimeagency.gov.uk\/news\/nca-leads-international-investigation-targeting-worlds-most-harmful-ransomware-group\">press release<\/a>, of course, and a video:<\/p>\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\">\n<div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">The NCA reveals details of an international disruption campaign targeting the world\u2019s most harmful cyber crime group, Lockbit.<\/p>\n<p>Watch our video and read on to learn more about Lockbit and why this is a huge step in our collective fight against cyber crime. <a href=\"https:\/\/t.co\/m00VFWkR9Z\">pic.twitter.com\/m00VFWkR9Z<\/a><\/p>\n<p>&mdash; National Crime Agency (NCA) (@NCA_UK) <a href=\"https:\/\/twitter.com\/NCA_UK\/status\/1759906806044725514?ref_src=twsrc%5Etfw\">February 20, 2024<\/a><\/p><\/blockquote><\/div>\n<\/figure>\n<p>But the real treat was an updated version of the LockBit website that returned it to something resembling its former self. However, some crucial details had changed. Until yesterday, the secret dark web site was used to list details of the organizations being held to ransom by LockBit. Green squares represented companies whose data had been leaked. Timers on the red squares showed companies under threat of a leak just how long they had until their stolen data would be published.<\/p>\n<p>Not any more, though. <\/p>\n<p>In a graphic illustration of just how comprehensively the LockBit group has been compromised, the green squares now detail published information about the takedown, while red squares tease further reveals for the coming days.<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>Today, after infiltrating the group\u2019s network, the NCA has taken control of LockBit\u2019s services, compromising their entire criminal enterprise.<\/p>\n<\/blockquote>\n<p>As well as taking over the leak site, law enforcement agencies have taken over LockBit\u2019s administration environment, seized the infrastructure used by LockBit&#8217;s data exfiltration tool, Stealbit, captured over 1,000 decryption keys, and frozen 200 cryptocurrency accounts.<\/p>\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img decoding=\"async\" loading=\"lazy\" width=\"1400\" height=\"1180\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/02\/lockbit-admin-panel_f2da9f.jpg?w=1024\" alt=\"LockBit admin panel\" class=\"wp-image-104799\" style=\"width:700px\" \/><figcaption class=\"wp-element-caption\">A screenshot from LockBit&#8217;s admin panel<\/figcaption><\/figure>\n<p>The group&#8217;s source code has also fallen into the hands of law enforcement, along with &#8220;a vast amount of intelligence&#8221; from its systems. Criminal affiliates who logged into the compromised environment were warned that the NCA knows all about their activities too, and the NCA reports that 28 servers belonging to LockBit affiliates have been taken down, too.<\/p>\n<p>Two &#8220;LockBit actors&#8221; have been arrested in Poland and Ukraine, and the US Department of Justice has announced that two defendants responsible for using LockBit in ransomware attacks have been charged, are in custody, and will face trial in the US.&nbsp;It also unsealed indictments against two Russian nationals, for conspiring to commit LockBit attacks.&nbsp;<\/p>\n<p>There are numerous reveals promised for the next few days, but the most tantalising is the imminent uncloaking of LockBit&#8217;s leader and spokesperson, LockBitSupp.<\/p>\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" width=\"700\" height=\"297\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/02\/lockbitsupp-reveal.jpg\" alt=\"Screenshot of the the &quot;Who is Lockbitsupp&quot; panel on the LockBit website.\" class=\"wp-image-104800\" style=\"width:700px;height:auto\" \/><figcaption class=\"wp-element-caption\">The identity of Lockbitsupp won&#8217;t be a mystery for much longer<\/figcaption><\/figure>\n<p>The NCA could have put the information about the takedown anywhere, but it didn&#8217;t; it did something memorable, humorous, and deliberately humiliating with it. In other words, it mimicked perfectly the way that ransomware gangs troll the world and each other. In doing so, the NCA signaled that it knows all about LockBit and the broader community of criminals it belongs to. It knows that LockBit&#8217;s affiliates and rivals will be watching, and looking over their shoulder.<\/p>\n<p>Good times.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-how-to-avoid-ransomware\">How to avoid ransomware<\/h2>\n<ul>\n<li><strong>Block common forms of entry.<\/strong>&nbsp;Create a plan for&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/business\/vulnerability-patch-management\">patching vulnerabilities<\/a>&nbsp;in internet-facing systems quickly; and disable or&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/03\/blunting-rdp-brute-force-attacks-with-rate-limiting\">harden remote access<\/a>&nbsp;like RDP and VPNs.<\/li>\n<li><strong>Prevent intrusions.<\/strong>&nbsp;Stop threats early before they can even infiltrate or infect your endpoints. Use&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/business\/edr\">endpoint security software<\/a>&nbsp;that can prevent exploits and malware used to deliver ransomware.<\/li>\n<li><strong>Detect intrusions.<\/strong>&nbsp;Make it harder for intruders to operate inside your organization by segmenting networks and assigning access rights prudently. Use&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/business\/edr\">EDR<\/a>&nbsp;or&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/business\/managed-detection-and-response\">MDR<\/a>&nbsp;to detect unusual activity before an attack occurs.<\/li>\n<li><strong>Stop malicious encryption.<\/strong>\u00a0Deploy Endpoint Detection and Response software like\u00a0<a href=\"https:\/\/www.malwarebytes.com\/business\/edr\">ThreatDown EDR<\/a>\u00a0that uses multiple different detection techniques to identify ransomware, and ransomware rollback to restore damaged system files.<\/li>\n<li><strong>Create offsite, offline backups.<\/strong>&nbsp;Keep backups offsite and offline, beyond the reach of attackers. Test them regularly to make sure you can restore essential business functions swiftly.<\/li>\n<li><strong>Don\u2019t get attacked twice.<\/strong>&nbsp;Once you&#8217;ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.<\/li>\n<\/ul>\n<p>You can learn more about the threat of big game ransomware like LockBit and ALPHV in our 2024 State of Malware report.<\/p>\n<div class=\"wp-block-malware-bytes-button mb-button\" id=\"mb-button-012c1351-e685-481e-acf0-85494bb687fd\">\n<div class=\"mb-button__row u-justify-content-center\">\n<div class=\"mb-button__item mb-button-item-0\">\n<p class=\"btn-main\"><a href=\"https:\/\/try.threatdown.com\/2024-state-of-malware\/?utm_source=blog&amp;utm_medium=social&amp;utm_campaign=b2b_ws_global_2024_state_of_malware_170673145305\">READ THE REPORT<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2024\/02\/law-enforcement-trolls-lockbit-reveals-massive-takedown\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Law enforcement has humiliated the humiliators.  <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[1001,3765],"class_list":["post-23983","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-business","tag-ransomware"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23983","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23983"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23983\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23983"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23983"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}