LockBit
   HOME

TheInfoList



OR:

LockBit is a
cybercriminal Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. It has been variously defined as "a crime committed on a computer network, especially the Internet"; Cybercriminals may explo ...
group proposing ransomware as a service (RaaS). Software developed by the group (also called
ransomware Ransomware is a type of malware that Encryption, encrypts the victim's personal data until a ransom is paid. Difficult-to-trace Digital currency, digital currencies such as paysafecard or Bitcoin and other cryptocurrency, cryptocurrencies are com ...
) enables malicious actors who are willing to pay for using it to carry out attacks in two tactics where they not only
encrypt In cryptography, encryption (more specifically, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the information, known as plai ...
the victim's data and demand payment of a
ransom Ransom refers to the practice of holding a prisoner or item to extort money or property to secure their release. It also refers to the sum of money paid by the other party to secure a captive's freedom. When ransom means "payment", the word ...
, but also threaten to
leak A leak is a way (usually an opening) for fluid to escape a container or fluid-containing system, such as a Water tank, tank or a Ship, ship's Hull (watercraft), hull, through which the contents of the container can escape or outside matter can e ...
it publicly if their demands are not met. According to a joint statement by various government agencies, LockBit was the world's most prolific ransomware in 2022. It was estimated in early 2023 to be responsible for 44% of all ransomware incidents globally. In the United States between January 2020 and May 2023, LockBit was used in approximately 1,700 ransomware attacks, with
US$ The United States dollar (Currency symbol, symbol: Dollar sign, $; ISO 4217, currency code: USD) is the official currency of the United States and International use of the U.S. dollar, several other countries. The Coinage Act of 1792 introdu ...
91 million paid in ransom to hackers. Government agencies did not formally attribute the group to any nation-state. Software with the name "LockBit" appeared on a Russian-language based cybercrime forum in January 2020. The group is financially motivated. However, in an interview on Inside Darknet, members claimed they are not Russian. Also available on Spotify: https://open.spotify.com/show/5RHKRk7awU2SFPq2VCwpLi In February 2024 law enforcement agencies seized control of LockBit
dark web The dark web is the World Wide Web content that exists on darknets ( overlay networks) that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can communica ...
sites used for attacks. However, further attacks with LockBit ransomware were later reported, with the group attempting to perform a comeback. In May 2025, the LockBit ransomware group's infrastructure was breached and defaced. The
data breach A data breach, also known as data leakage, is "the unauthorized exposure, disclosure, or loss of personal information". Attackers have a variety of motives, from financial gain to political activism, political repression, and espionage. There ...
resulted in a data dump, exposing
Bitcoin Bitcoin (abbreviation: BTC; Currency symbol, sign: ₿) is the first Decentralized application, decentralized cryptocurrency. Based on a free-market ideology, bitcoin was invented in 2008 when an unknown entity published a white paper under ...
wallet addresses, public encryption keys, internal chat logs with victims, affiliate details, and other sensitive information.


Description

LockBit software, written in the C and C++ programming languages until
.NET The .NET platform (pronounced as "''dot net"'') is a free and open-source, managed code, managed computer software framework for Microsoft Windows, Windows, Linux, and macOS operating systems. The project is mainly developed by Microsoft emplo ...
was used for the LockBit-NG-Dev under development at takedown in 2024, gains initial access to computer systems using purchased access, unpatched
vulnerabilities Vulnerability refers to "the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally." The understanding of social and environmental vulnerability, as a methodological approach, involves ...
, insider access, and
zero-day exploit A zero-day (also known as a 0-day) is a vulnerability or security hole in a computer system unknown to its developers or anyone capable of mitigating it. Until the vulnerability is remedied, threat actors can exploit it in a zero-day exploit, or z ...
s, in the same way as other malware. LockBit then takes control of the infected system, collects
network Network, networking and networked may refer to: Science and technology * Network theory, the study of graphs as a representation of relations between discrete objects * Network science, an academic field that studies complex networks Mathematics ...
information, and steals and encrypts data. Demands are then made for the victim to pay a ransom for their data to be decrypted so that it is again available, and for the perpetrators to delete their copy, with the threat of otherwise making the data public. (While the data are not published if the ransom is paid, it was found when LockBit was taken down by law enforcement that it had not been deleted.) LockBit gained attention for its creation and use of the
malware Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
called "StealBit", which automates transferring data to the intruder. This tool was introduced with the release of LockBit 2.0, which has fast and efficient encryption capabilities. To expand their reach, LockBit also released Linux-ESXI Locker version 1.0, targeting
Linux Linux ( ) is a family of open source Unix-like operating systems based on the Linux kernel, an kernel (operating system), operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically package manager, pac ...
hosts, particularly
VMware ESXi VMware ESXi (formerly ESX) is an Enterprise software, enterprise-class, Native hypervisor, type-1 hypervisor developed by VMware, a subsidiary of Broadcom, for deploying and Server (computing), serving Hardware virtualization, virtual computers. ...
servers. LockBit recruits affiliates and develops partnerships with other criminal groups. They hire network access brokers, cooperate with organizations like Maze, and recruit insiders from targeted companies. To attract talented
hacker A hacker is a person skilled in information technology who achieves goals and solves problems by non-standard means. The term has become associated in popular culture with a security hackersomeone with knowledge of bug (computing), bugs or exp ...
s, they have sponsored underground technical writing contests. LockBit has targeted various industries globally, however, healthcare and education sectors are the biggest victims. According to
Trend Micro is an American-Japanese cyber security software company. The company has globally dispersed R&D in 16 locations across every continent excluding Antarctica. The company develops enterprise security software for servers, containers, and cloud ...
, in terms of attack attempts, United States, India and Brazil are the top targeted countries. LockBit is efficient and adaptable: they emphasize their malware's speed and capabilities to attract victims. They take external factors like data privacy laws into consideration when targeting potential victims. LockBit's success also relies heavily on their affiliate program, which helps them innovate and compete in the ransomware landscape. On its site on the dark web, LockBit stated that it was "located in the Netherlands, completely apolitical and only interested in money".


Techniques and tactics

LockBit operators frequently gain initial access by exploiting vulnerable
Remote Desktop Protocol Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft Corporation which provides a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client software for this pu ...
(RDP) servers or compromised credentials purchased from affiliates. Initial access vectors also include
phishing Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware. Phishing attacks have become increasingly sophisticate ...
emails with malicious attachments or links, brute-forcing weak RDP or
VPN Virtual private network (VPN) is a network architecture for virtually extending a private network (i.e. any computer network which is not the public Internet) across one or multiple other networks which are either untrusted (as they are not c ...
passwords, and exploiting vulnerabilities such as CVE-2018-13379 in
Fortinet Fortinet, Inc. is an American cybersecurity company with headquarters in Sunnyvale, California. The company develops and sells security solutions like firewalls, endpoint security and intrusion detection systems. Fortinet has offices located ...
VPNs. Once installed, LockBit ransomware is often executed in
Microsoft Windows Windows is a Product lining, product line of Proprietary software, proprietary graphical user interface, graphical operating systems developed and marketed by Microsoft. It is grouped into families and subfamilies that cater to particular sec ...
via
command-line argument A command-line interface (CLI) is a means of interacting with software via command (computing), commands each formatted as a line of text. Command-line interfaces emerged in the mid-1960s, on computer terminals, as an interactive and more user ...
s, scheduled tasks, or PowerShell scripts such as PowerShell Empire. LockBit uses tools such as Mimikatz, GMER, Process Hacker, and registry edits to gather
credentials A credential is a piece of any document that details a qualification, competence, or authority issued to an individual by a third party with a relevant or '' de facto'' authority or assumed competence to do so. Examples of credentials include ac ...
, disable security products, and evade defenses. It enumerates network connections to identify high-value targets such as domain controllers using scanners such as Advanced Port Scanner. For lateral movement, LockBit spreads through SMB
file-sharing File sharing is the practice of distributing or providing access to digital media, such as computer programs, multimedia (audio, images and video), documents or electronic books. Common methods of storage, transmission and dispersion include re ...
connections inside networks, using credentials gathered earlier. Other lateral movement techniques include distributing itself via compromised
Group Policy Group Policy is a feature of the Microsoft Windows NT family of operating systems (including Windows 8.1, Windows 10, Windows 11) that controls the working environment of user accounts and computer accounts. Group Policy provides centralized mana ...
objects, or using tools such as PsExec or Cobalt Strike. LockBit's ransomware payload encrypts files and network shares using AES and RSA encryption. It encrypts only the first few
kilobyte The kilobyte is a multiple of the unit byte for Computer data storage, digital information. The International System of Units (SI) defines the prefix ''kilo-, kilo'' as a multiplication factor of 1000 (103); therefore, one kilobyte is 1000&nbs ...
s of each file for faster processing, and adds a ".lockbit" extension. LockBit then replaces the desktop wallpaper with a ransom note; it can also print ransom notes to attached printers. The goal is to extort payment of a ransom to reverse system disruption and restore file access.


History

LockBit
malware Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
was previously known as ".abcd", after the file extension that was added to encrypted files as they were made inaccessible. LockBit was first observed in September 2019.


LockBit 2.0

LockBit 2.0 appeared in 2021 and came into the spotlight with their attack on
Accenture Accenture plc is a global multinational professional services company originating in the United States and headquartered in Dublin, Ireland, that specializes in information technology (IT) services and management consulting. It was founded in 1 ...
the same year, where an insider probably helped the group entering the network. LockBit published some of the data stolen in this attack. In January 2022, the electronics company
Thales Thales of Miletus ( ; ; ) was an Ancient Greek philosophy, Ancient Greek Pre-Socratic philosophy, pre-Socratic Philosophy, philosopher from Miletus in Ionia, Asia Minor. Thales was one of the Seven Sages of Greece, Seven Sages, founding figure ...
was one of the victims of Lockbit 2.0. In July 2022, the administrative and management services of La Poste Mobile were attacked. In September 2022, the group's hackers claimed cyberattacks against 28 organizations, 12 of which involved French organizations. Among them, the Corbeil Essonnes hospital was targeted with a ransom demand of US$10 million. In October 2022, the LockBit group claimed responsibility for an attack on Pendragon PLC, a group of automotive retailers in the UK, demanding a ransom of US$60 million to decrypt the files and not leak them; the company stated that they refused the demand. On October 31, 2022, the LockBit hacker group claimed to have attacked Thales Group for the second time and did not demand a ransom, but said that the data would be released. The hacker group offered assistance to Thales customers affected by the theft, in order to lodge a complaint against Thales, a group "that has greatly disregarded confidentiality rules". On November 10, 2022, the LockBit 3.0 group published on the darknet a 9.5 GB archive with stolen information on Thales contracts in Italy and Malaysia. In November 2022, OEHC - Office d'Équipement Hydraulique de Corse - was the victim of a cyberattack that encrypted the company's computer data. A ransom demand was made by the hacker group, to which OEHC did not respond. In December 2022, the LockBit hacker group claimed responsibility for the attack on the California Finance Administration. The governor's office acknowledged being the victim of an attack, without specifying its scale. Lockbit claims to have stolen 246,000 files with a total size of 75.3 GB. In December 2022, the hacker group claimed to have attacked the
port of Lisbon The Port of Lisbon ( Portuguese: ''Porto de Lisboa'') is the third-largest port in Portugal, mainly on the north sides of the Tagus's large natural harbour that opens west, through a short strait, onto the Atlantic Ocean. Each part lies against ce ...
. The ransom was set at US$1.5 million, to be paid by January 18, 2023. On December 18, 2022, a group of hackers attacked
Toronto Toronto ( , locally pronounced or ) is the List of the largest municipalities in Canada by population, most populous city in Canada. It is the capital city of the Provinces and territories of Canada, Canadian province of Ontario. With a p ...
's Hospital for Sick Children. After realizing their blunder, the hacker group stopped the attack, apologized and offered a free solution to recover the encrypted files. In a subsequent interview, LockBit members stated they have a policy against attacking hospitals.


LockBit 3.0

In late June 2022, the group launched "LockBit 3.0", the latest variant of their ransomware, after two months of
beta testing Software testing is the act of checking whether software satisfies expectations. Software testing can provide objective, independent information about the quality of software and the risk of its failure to a user or sponsor. Software test ...
. Notably, the group introduced a bug bounty program, the first of its kind in the realm of ransomware operations. They invited security researchers to test their software to improve their security, offering substantial monetary rewards ranging from
US$ The United States dollar (Currency symbol, symbol: Dollar sign, $; ISO 4217, currency code: USD) is the official currency of the United States and International use of the U.S. dollar, several other countries. The Coinage Act of 1792 introdu ...
1,000 to $1 million. In August 2022, German equipment manufacturer
Continental Continental may refer to: Places * Continental, Arizona, a small community in Pima County, Arizona, US * Continental, Ohio, a small town in Putnam County, US Arts and entertainment * ''Continental'' (album), an album by Saint Etienne * Continen ...
suffered a LockBit ransomware attack. In November 2022, with no response to its ransom demand, the hacker group published part of the stolen data and offered access to all of it for 50 million euros. Among the stolen data are the private lives of the Group's employees, as well as exchanges with German car manufacturers. Beyond the theft of data, the danger lies in opening the way to industrial espionage. Indeed, among the exchanges with
Volkswagen Volkswagen (VW; )English: , . is a German automotive industry, automobile manufacturer based in Wolfsburg, Lower Saxony, Germany. Established in 1937 by German Labour Front, The German Labour Front, it was revitalized into the global brand it ...
are IT aspects, from automated driving to entertainment, in which Volkswagen wanted Continental to invest. In November 2022, the
United States Department of Justice The United States Department of Justice (DOJ), also known as the Justice Department, is a United States federal executive departments, federal executive department of the U.S. government that oversees the domestic enforcement of Law of the Unite ...
announced the arrest of Mikhail Vasiliev, a dual Russian and Canadian national, in connection with the LockBit ransomware campaign. According to the charges, Vasiliev allegedly conspired with others involved in LockBit, a ransomware variant that had been used in over 1,000 attacks globally as of November 2022. According to reports, the operators of LockBit had made at least $100 million in ransom demands, of which tens of millions had been paid by victims. The arrest followed a 2.5 year investigation into the LockBit ransomware group by the Department of Justice. In January 2023, the hacker group claimed to have attacked the French luxury goods company Nuxe and ELSAN, a French group of private clinics. The hacker group filched 821 GB of data from the company's headquarters. The same month,
Royal Mail Royal Mail Group Limited, trading as Royal Mail, is a British postal service and courier company. It is owned by International Distribution Services. It operates the brands Royal Mail (letters and parcels) and Parcelforce Worldwide (parcels) ...
's international export services were severely disrupted by a Lockbit ransomware attack. In February 2023, the group claimed responsibility for an attack on
Indigo Books and Music Indigo Books & Music Inc., known as "Indigo" and stylized "!ndigo", is Canada's only major English-language bookstore chain. It is Canada's largest book, gift, and specialty toy retailer, operating stores in all ten Provinces and territori ...
, a chain of Canadian bookstores. In March 2023, the group claimed responsibility for attacking , a water specialist in France. On May 16, 2023, the hacker group claimed responsibility for attacking the Hong Kong branch of the Chinese newspaper
China Daily ''China Daily'' ( zh, s=中国日报, p=Zhōngguó Rìbào) is an English-language daily newspaper owned by the Central Propaganda Department of the Chinese Communist Party. Overview ''China Daily'' has the widest print circulation of any ...
. This is the first time the hacker group has attacked a Chinese company. LockBit does not attack Russian entities and avoids attacking Russian allies. In May 2023, the hacker group claimed responsibility for the attack on . The hacker group stole some 10,000 identity documents from the company's customer files. In June 2023, the
United States Department of Justice The United States Department of Justice (DOJ), also known as the Justice Department, is a United States federal executive departments, federal executive department of the U.S. government that oversees the domestic enforcement of Law of the Unite ...
announced criminal charges against Ruslan Magomedovich Astamirov, a Russian national, for his alleged participation in the LockBit ransomware campaign as an affiliate. The charges allege that Astamirov directly executed at least five ransomware attacks against victims and received a portion of ransom payments in bitcoin. At the end of June 2023, the
TSMC Taiwan Semiconductor Manufacturing Company Limited (TSMC or Taiwan Semiconductor) is a Taiwanese multinational semiconductor contract manufacturing and design company. It is one of the world's most valuable semiconductor companies, the world' ...
group fell victim to a ransomware attack via one of its suppliers. LockBit demanded a $70 million ransom. In July 2023, LockBit attacked the
Port of Nagoya The , located in Ise Bay, is the largest and busiest trading port in Japan, accounting for about 10% of the total trade value of Japan. Notably, this port is the largest exporter of cars in Japan and where the Toyota Motor Corporation exports most ...
in Japan, which handles 10% of the country's trade. The attack forced a shutdown of container operations. In October 2023, LockBit claimed to have stolen sensitive data from
Boeing The Boeing Company, or simply Boeing (), is an American multinational corporation that designs, manufactures, and sells airplanes, rotorcraft, rockets, satellites, and missiles worldwide. The company also provides leasing and product support s ...
. Boeing acknowledged they were aware of a cyber incident affecting some of their parts and distribution business a few days later, though it did not affect flight safety; they did not name the suspected attackers. In November 2023, LockBit attacked the U.S. subsidiary of the Chinese state-owned
Industrial and Commercial Bank of China The Industrial and Commercial Bank of China (ICBC; zh, 中国工商银行) is a Chinese partially state-owned multinational banking and financial services corporation headquartered in Beijing, China. It is the largest of the " big four" banks ...
. ''Bloomberg'' reported that the US unit of ICBC at the time was considered the world's largest lender by assets. In November 2023, LockBit released internal data that the group had stolen a month earlier from Boeing onto the Internet. In November 2023, the LockBit gang attacked the Chicago Trading Company and
Alphadyne Asset Management Alphadyne Asset Management (Alphadyne) is an American hedge fund management firm headquartered in New York City. The firm's focuses on global macro and fixed-income relative-value investing strategies. Outside the U.S., Alphadyne has offices in ...
. ''Bloomberg'' reported that the CTC had been hacked in October, and that over the prior year Lockbit had "become the world’s most prolific ransomware group." Since 2020, it had reportedly carried out 1,700 attacks and extorted $91 million, according to the US
Cybersecurity and Infrastructure Security Agency The Cybersecurity and Infrastructure Security Agency (CISA) is a component of the United States Department of Homeland Security (DHS) responsible for cybersecurity and infrastructure protection across all levels of government, coordinating cyber ...
. ''
The Register ''The Register'' (often also called El Reg) is a British Technology journalism, technology news website co-founded in 1994 by Mike Magee (journalist), Mike Magee and John Lettice. The online newspaper's Nameplate_(publishing), masthead Logo, s ...
'' reported in late November 2023 that LockBit was facing growing internal frustrations, and that its leaders were overhauling some of its negotiation methods with victims in response to the low pay rate achieved. In January 2024, the LockBit gang attacked Fulton County computers. The county released a statement on the attack the following month, saying they had not paid the ransom, that it was not associated with the election process, they were not aware of any extraction of sensitive information about citizens or employees. In May 2024, the LockBit gang claimed responsibility for an attack on Canadian retailer London Drugs, which closed all locations across Canada. LockBit then threatened to release data within 48 hours if a ransom of $25 million was not paid. London Drugs stated that they were "unwilling and unable to pay ransom" to the parties involved. No customer or primary employee data was compromised. On May 23, 2024, the company confirmed that data had been leaked by Lockbit, and that affected employees were being offered identity theft protection services. In June 2024, the LockBit gang attacked the University Hospital Center in
Zagreb Zagreb ( ) is the capital (political), capital and List of cities and towns in Croatia#List of cities and towns, largest city of Croatia. It is in the Northern Croatia, north of the country, along the Sava river, at the southern slopes of the ...
, the largest medical facility in
Croatia Croatia, officially the Republic of Croatia, is a country in Central Europe, Central and Southeast Europe, on the coast of the Adriatic Sea. It borders Slovenia to the northwest, Hungary to the northeast, Serbia to the east, Bosnia and Herze ...
. The cyberattack caused significant disruption, taking the hospital "back 50 years—to paper and pencil". LockBit claimed to have exfiltrated a large number of files, including medical records and employee information, and demanded an undisclosed sum in exchange for not publishing the data. The Croatian government refused the demands. In March 2025, cybersecurity researchers at Forescout reported that a ransomware group known as Mora_001 had used a variant of LockBit 3.0, also known as LockBit Black, as the foundation for a new strain called SuperBlack. According to ''The Register'', the group modified the original ransomware by removing LockBit branding, changing the ransom note, and adding a custom
data exfiltration Data exfiltration occurs when malware and/or a malicious actor carries out an unauthorized data transfer from a computer. It is also commonly called data extrusion or data exportation. Data exfiltration is also considered a form of data theft. Sinc ...
module. Forescout also noted the presence of a qTox ID previously associated with LockBit, suggesting a possible operational link or shared infrastructure between the groups.


LockBit-NG-Dev (LockBit 4?)

When the LockBit server was closed down by law enforcement in February 2024, it was found that a new version, LockBit-NG-Dev, probably to be released as LockBit 4.0, had been under advanced development;
Trend Micro is an American-Japanese cyber security software company. The company has globally dispersed R&D in 16 locations across every continent excluding Antarctica. The company develops enterprise security software for servers, containers, and cloud ...
published a detailed report on it. In December 2024, LockBit announced version 4.0 of its ransomware, set for release in February 2025. The group expanded its dark web infrastructure and shared samples with researchers. The launch followed a major law enforcement takedown that disrupted its operations earlier that year. In its 2024 Internet Crime Report, the
FBI The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
identified LockBit as the most reported ransomware targeting U.S. critical infrastructure. Cisco Talos likewise ranked LockBit as the top ransomware group by volume, responsible for 16 percent of attacks. Researchers linked its continued activity to the leaked LockBit builder and noted that disruption of the group may have boosted rival operations like Akira and RansomHub.


Seizure by law enforcement in 2024

On February 19, 2024, the
National Crime Agency The National Crime Agency (NCA) is a Law enforcement agency#natlea, national law enforcement agency in the United Kingdom. It is the UK's lead agency against organised crime; Human trafficking, human, Arms trafficking, weapon and Illegal drug t ...
in collaboration with
Europol Europol, officially the European Union Agency for Law Enforcement Cooperation, is the law enforcement agency of the European Union (EU). Established in 1998, it is based in The Hague, Netherlands, and serves as the central hub for coordinating c ...
and other international law enforcement agencies seized control of darknet websites belonging to the LockBit ransomware gang as a part of Operation Cronos. An unverified report said that Lockbit had said that its servers running on the programming language PHP had been hit, but that it had backup servers without PHP that were "not touched". One person was arrested in Ukraine, one in Poland, and two in the United States. Two Russians were also named, but have not been arrested. According to Graeme Biggar, Director General of the National Crime Agency, law enforcement has "taken control of their infrastructure, seized their source code, and obtained keys that will help victims decrypt their systems." A decryptor for LockBit 3.0 was made using the seized keys and released for free use o
No More Ransom
After the takedown, law enforcement posted information about the group on its dark web site, including that it had at least 188 affiliates. Law enforcement also obtained 30,000 Bitcoin addresses used for managing the group's profits from ransom payments, which contained 2,200 BTC ($112 million USD). As of 22 February 2024 LockBit ransomware was still spreading. On 24 February 2024 a new website claiming to be run by LockBit appeared. The new site listed more than a dozen alleged victims including the FBI, hospitals and Fulton County, Georgia. The new site threatened to release information relating to Fulton County unless a ransom was paid by 2 March 2024. The new site claimed to have the identities of members of a jury in a murder trial. There was also a threat to release Fulton County documents relating to court cases involving
Donald Trump Donald John Trump (born June 14, 1946) is an American politician, media personality, and businessman who is the 47th president of the United States. A member of the Republican Party (United States), Republican Party, he served as the 45 ...
if the ransom wasn't paid. On 7 May 2024 charges and sanctions were announced against Dmitry Khoroshev, the alleged administrator and developer of LockBit. On 21 May 2024, LockBit claimed responsibility for an attack on the corporate offices of Canadian retail chain London Drugs, demanding a payment of $25 million. All London Drugs stores were closed nationwide from 28 April–7 May 2024 due to the attack. London Drugs is refusing to pay the ransom, and stated that customer and "primary employee" data was not compromised. In June 2024, LockBit claimed responsibility for a major breach of Evolve Bank & Trust, a partner bank of many financial technology companies including Stripe, Mercury, Affirm, and Airwallex. The group had threatened to leak data from the
US Federal Reserve The Federal Reserve System (often shortened to the Federal Reserve, or simply the Fed) is the central banking system of the United States. It was created on December 23, 1913, with the enactment of the Federal Reserve Act, after a series of ...
, but the leaked data appeared to come directly from Evolve, not the Federal Reserve. In 2025, the Israeli developer Rostislav Panev is
extradited In an extradition, one jurisdiction delivers a person accused or convicted of committing a crime in another jurisdiction, into the custody of the other's law enforcement. It is a cooperative law enforcement procedure between the two jurisdic ...
to the
United States The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
for participating in the development of Lockbit ransomware, three months after having been charged with the cybercrime connection.


References


See also

* BlackCat (cyber gang) *
Clop (cyber gang) Clop (sometimes written “Cl0p”) is a cybercriminal organization known for its multilevel extortion techniques and global malware distribution. It has extorted more than $500 million in ransom payments, targeting major organizations worldwide. ...
*
Conti (ransomware) Conti is malware developed and first used by the Russia-based hacking group "Wizard Spider" in December, 2019. It has since become a full-fledged Ransomware as a service, ransomware-as-a-service (RaaS) operation used by numerous threat actor gro ...
* Dridex * Royal (cyber gang) {{Hacking in the 2020s Cybercrime Hacker groups Ransomware