Tech News
LockBit ransomware gang teases February 2025 return
After being targeted by the National Crime Agency (NCA) coordinated Operation Cronos in February 2024, an individual or group associated with the LockBit ransomware gang has emerged to announce the upcoming release of a new locker malware, LockBit 4.0.
Screenshots from the dark web have surfaced on social media, showing the cyber criminal inviting interested parties to join their “pentester billionaire journey” with promises of supercars and women. As of now, the links provided do not lead anywhere, but a countdown timer indicates a launch date of 3 February 2025.
Robert Fitzsimons, lead threat intelligence engineer at Searchlight Cyber, expressed uncertainty about what LockBit 4.0 will entail. It is unclear if the gang is launching a new leak site or making changes to their ransomware.
Fitzsimons noted that LockBit has undergone several iterations, with the current version being LockBit 3.0. The motivation behind the update could be to re-establish credibility following the setbacks caused by Operation Cronos earlier in the year.
Despite a decline in LockBit’s activities post-Operation Cronos, the recent announcement indicates their efforts to attract affiliates and continue operations.
The timing of the announcement coincides with reports of the US government seeking the extradition of an alleged LockBit operative, Rotislav Panev, from Israel to face charges of wire fraud and cybercrime.
Panev, a software developer for LockBit, is accused of creating mechanisms used for printing ransom notes on compromised systems. His lawyer asserts Panev’s innocence, claiming he was not involved in any fraudulent activities.
An extradition hearing for Panev is scheduled for January 2025, with ongoing efforts to bring him to trial.
LockBit down but not out?
Following Operation Cronos in early 2024, more details about the cyber criminal operation have been revealed by the NCA and other participating agencies.
In May, the NCA identified LockBit’s leader as Dmitry Khoroshev and took action against him, including asset freezes and travel bans. Khoroshev faces multiple charges in the US, but his true identity remains disputed.
Additionally, a prominent LockBit affiliate, Aleksandr Ryzhenkov, was exposed for his involvement in the operation and connections to Evil Corp.
Despite law enforcement efforts, cyber criminals like LockBit have shown resilience and the ability to resume their activities after disruptions.
Defenders should remain vigilant for potential attacks and implement anti-ransomware measures to protect against threats.
-
Destination3 months ago
Singapore Airlines CEO set to join board of Air India, BA News, BA
-
Tech News7 months ago
Bangladeshi police agents accused of selling citizens’ personal information on Telegram
-
Motivation7 months ago
The Top 20 Motivational Instagram Accounts to Follow (2024)
-
Guides & Tips6 months ago
Satisfy Your Meat and BBQ Cravings While in Texas
-
Guides & Tips5 months ago
Have Unlimited Korean Food at MANY Unlimited Topokki!
-
Gaming4 months ago
The Criterion Collection announces November 2024 releases, Seven Samurai 4K and more
-
Self Development7 months ago
Don’t Waste Your Time in Anger, Regrets, Worries and Grudges
-
Tech News5 months ago
Soccer team’s drone at center of Paris Olympics spying scandal