Get 40% Off
🚀 AI-picked stocks soar in May. PRFT is +55%—in just 16 days! Don’t miss June’s top picks.Unlock full list

Explainer-What is Lockbit? The digital extortion gang on a cybercrime spree

Published 11/10/2023, 06:41 PM
Updated 11/10/2023, 06:45 PM
© Reuters. People walk past a branch of Industrial and Commercial Bank of China (ICBC) in Beijing, China April 1, 2019. Picture taken April 1, 2019.  REUTERS/Florence Lo/File Photo
BA
-
IDCBY
-

By Zeba Siddiqui and James Pearson

SAN FRANCISCO/LONDON (Reuters) - A cybercriminal group named Lockbit, which on Friday said it breached the Industrial and Commercial Bank of China(ICBC), has hacked some of the world’s largest organisations in recent months, stealing and leaking their sensitive data if they didn't pay ransom. Here are some details about the group:

WHERE IS LOCKBIT FROM?

Lockbit was discovered in 2020 when its eponymous malicious software was found on Russian-language cybercrime forums, leading some security analysts to believe the gang is based in Russia. The gang has not professed support for any government, however, nor has any government formally attributed it to a nation-state.

"We are located in the Netherlands, completely apolitical and only interested in money," the gang says on its dark web blog.

In just three years, it has become the world's top ransomware threat, according to U.S. officials. Nowhere has it been more disruptive than in the United States, hitting more than 1,700 American organisations in nearly every industry from financial services and food to schools, transportation and government departments.

Among its latest victims is the defense and aerospace giant Boeing (NYSE:BA). On Friday, Lockbit leaked a cache of internal data it had obtained by breaching Boeing's systems. Earlier in the year the gang's hack into the financial-trading services group ION disrupted operations at customers that included some of the world’s biggest banks, brokerages and hedge funds.

HOW DOES LOCKBIT TARGET ORGANISATIONS?

The cybercrime gang infects a victim organisation's system with ransomware - malicious software that encrypts data - and then coerces targets into paying ransom to decrypt or unlock it. Such ransom is usually demanded in the form of cryptocurrency, which is harder to trace and gives the receiver anonymity.

U.S. and other officials in a 40-country alliance have been trying to trying to stem the global scourge of ransomware by sharing intelligence between nations on the cryptocurrency wallet addresses of such criminals.

On the dark web, Lockbit's blog displays an ever-growing gallery of victim organisations that is updated nearly daily. Next to their names are digital clocks showing the number of days left to the deadline given to each organisation to provide ransom payment, failing which, the gang publishes the sensitive data it has collected.

Often victim organisations will seek the help of cybersecurity companies to identify what data was leaked and negotiate ransom amounts with the hackers. Such behind-the-scenes talks usually remain private and can sometimes take days or weeks, according to security analysts.

It's common for some victim names to not show up on the Lockbit blog if the threat was made privately. ICBC's U.S. unit, which said it was working on recovering from the breach, was not listed on Lockbit's blog on Friday.

HOW DOES LOCKBIT OPERATE?

In part, Lockbit's success depends on its so-called 'affiliates' - likeminded criminal groups who are recruited to wage attacks using Lockbit’s digital extortion tools.

© Reuters. People walk past a branch of Industrial and Commercial Bank of China (ICBC) in Beijing, China April 1, 2019. Picture taken April 1, 2019.  REUTERS/Florence Lo/File Photo

On its website, the gang boasts of its successes in hacking various organisations and lays out a detailed set of rules for cybercriminals who may submit an "application form" to work with them. "Ask your friends or acquaintances who already work with us to vouch for you," one of those rules says.

This web of alliances between cybercriminal groups makes tracking such hacking activity and attempts to ransom victims difficult, since their tactics and techniques can vary with each attack.

Latest comments

Risk Disclosure: Trading in financial instruments and/or cryptocurrencies involves high risks including the risk of losing some, or all, of your investment amount, and may not be suitable for all investors. Prices of cryptocurrencies are extremely volatile and may be affected by external factors such as financial, regulatory or political events. Trading on margin increases the financial risks.
Before deciding to trade in financial instrument or cryptocurrencies you should be fully informed of the risks and costs associated with trading the financial markets, carefully consider your investment objectives, level of experience, and risk appetite, and seek professional advice where needed.
Fusion Media would like to remind you that the data contained in this website is not necessarily real-time nor accurate. The data and prices on the website are not necessarily provided by any market or exchange, but may be provided by market makers, and so prices may not be accurate and may differ from the actual price at any given market, meaning prices are indicative and not appropriate for trading purposes. Fusion Media and any provider of the data contained in this website will not accept liability for any loss or damage as a result of your trading, or your reliance on the information contained within this website.
It is prohibited to use, store, reproduce, display, modify, transmit or distribute the data contained in this website without the explicit prior written permission of Fusion Media and/or the data provider. All intellectual property rights are reserved by the providers and/or the exchange providing the data contained in this website.
Fusion Media may be compensated by the advertisers that appear on the website, based on your interaction with the advertisements or advertisers.
© 2007-2024 - Fusion Media Limited. All Rights Reserved.