A coordinated international law enforcement operation recently targeted the LockBit ransomware gang, leading to the seizure of its website, infrastructure, and data. Despite this significant takedown, the cybercrime group has announced its comeback, blaming outdated software for their initial vulnerability and secretly building a new version of its file encryptor, dubbed LockBit-NG-Dev. They have reportedly restored their servers just 2 days after the server takedown and are calling for increased attacks on the government sector. This resurgence highlights the persistent challenge of combating cybercrime, as even successful takedowns do not address the root issues exploited by digital extortionists. The operation involved the UK National Crime Agency (NCA) and an international coalition, striking a blow against the Russian-based, one of the most prolific ransomware groups. However, experts, including Ed Williams from Trustwave, caution that such actions do not fix the underlying problems of ransomware and digital extortion.
LockBit is back extorting victims on the dark web a week after a major international law enforcement taskforce knocked the prolific #ransomware gang’s operations offline. #cybersecurity #infosec #ITsecurity https://t.co/FZvYAFSqse
Russian-based LockBit ransomware hackers attempt a comeback https://t.co/msIoXkiuaE
Lockbit cybercrime gang claims restoration of operations following global police crackdown https://t.co/YS4iB3E1vr https://t.co/wAlYOfgISv
Lockbit cybercrime gang says it is back online following global police bust https://t.co/GzSIgVKmeR https://t.co/RqyaTcSj2I
Lockbit, the cybercrime gang that was knocked offline by a comprehensive international police operation earlier this month, says it has restored its servers and is back in business. https://t.co/eytfqSkz1y
⚠️ LOCKBIT CYBERCRIME GANG SAYS IT IS BACK ONLINE FOLLOWING GLOBAL POLICE BUST (Reuters) Lockbit, the cybercrime gang that was knocked offline by a comprehensive international police operation earlier this month, says it has restored its servers and is back in business. The… https://t.co/z2Itba1Vel
Hack me if you can: LockBit challenges authorities, promises to return https://t.co/lJ4bdR2dRT
LockBit ransomware gang returns a week after supposed takedown by law enforcement https://t.co/PMTbkUoA5a https://t.co/VR2zvqFW7g
LockBit Ransomware Group Resurfaces After Law Enforcement Takedown: https://t.co/Gs1qJv7g8A by The Hacker News #infosec #cybersecurity #technology #news
🚨 LockBit #ransomware operators are back online after a law enforcement takedown, blaming outdated software for the breach. They are now calling for increased attacks on the government sector. Find out more: https://t.co/cDIAvUBok4 #cybersecurity #informationsecurity
LockBit’s website, infrastructure, and data have been seized by law enforcement—striking a huge blow against one of the world’s most prolific ransomware groups. https://t.co/eykBfeB6QB
The notorious cybercrime gang Lockbit was disrupted by the NCA along with an international coalition of law enforcement agencies. Full story 👇 https://t.co/fH0Heae4JC #Tech | #News | #Lockbit
After LockBit takedown, police try to sow doubt in cybercrime community. https://t.co/nCtOghXK1k via @AJVicens
The #LockBit takedown does not fix the root issues that #ransomware and digital extortion threat actors exploit, warns @Trustwave's Ed Williams. #cybersecurity https://t.co/eoKfFwh0fr
Ransomware Associated With LockBit Still Spreading 2 Days After Server Takedown https://t.co/3bvNUXncph
International Operation Hits Major Ransomware Player LockBit https://t.co/swyttZmDsf
Trend Micro and the UK NCA: LockBit was secretly building a new version of its file encryptor, dubbed LockBit-NG-Dev, when law enforcement took down the gang (@billtoulas / BleepingComputer) https://t.co/eB4Ci1inQW 📫 Subscribe: https://t.co/OyWeKSRpIM https://t.co/Yycpy1fl9f