HomeCII/OTConfiscating 30,000 Bitcoin in LockBit Takedown

Confiscating 30,000 Bitcoin in LockBit Takedown

Published on

spot_img

Law enforcement agencies have made significant progress in the aftermath of the comprehensive LockBit takedown, uncovering new intelligence on the notorious ransomware group and its network of affiliates. Following the recent arrests of Russian nationals Artur Sungatov and Ivan Gennadievich Kondratiev, authorities have revealed a staggering 30,000 Bitcoin addresses associated with LockBit ransomware and its affiliates. This discovery not only deals a heavy financial blow to cybercriminals but also serves as a clear warning to those operating in the shadows of the dark web.

Operation Cronos, the initiative behind the LockBit takedown, has shed light on the extensive operations of the ransomware group, implicating a total of 193 affiliates at the time of the seizure. Additionally, ties between LockBit and other threat actors such as Evil Corp and FIN7 have been uncovered, underscoring the interconnected nature of cybercriminal activity.

Insights gleaned from Operation Cronos have revealed the vast profits accumulated by LockBit and its affiliates over the years. A tweet from security researcher Dominic Alvieri highlights a post showcasing the substantial financial gains made by the ransomware group during their four-year operation.

Furthermore, a crypto chain analysis conducted by the National Crime Agency has unearthed approximately 30,000 BTC addresses linked to LockBit, with hundreds of them actively engaging in transactions on the blockchain. The collective value of these transactions exceeds £100 million, with over 2,200 BTC remaining unspent, totaling more than £90 million. These funds comprise both victim payments and LockBit’s fees, indicating that actual ransom payments may be significantly higher than previously estimated.

Despite the recent arrests of key LockBit members and affiliates, the group has vehemently denied the legitimacy of these actions, challenging the credibility of law enforcement agencies. By offering a substantial bounty for information on their members, LockBit is displaying a defiant stance against intensified scrutiny from authorities.

In a bid to assist victims of the LockBit 3.0 ransomware attack, authorities are providing decryption tools through a designated site managed by the UK, US, and Cronos Task Force, along with agencies like the National Crime Agency and Europol. The site offers updates on investigations, recovery tools, and information on recent activities related to cybercrime. Victims are encouraged to make use of available resources to combat the threat posed by LockBit 3.0.

In conclusion, the takedown of LockBit and its affiliates represents a significant victory in the ongoing battle against cybercrime. However, as cybercriminals continue to adapt and evolve, sustained collaboration and innovation will be essential in staying ahead of the ever-evolving threats to digital security.

Source link

Latest articles

New Aeternum C2 Botnet Avoids Takedowns Using Polygon Blockchain

The Evolution of Botnets: Aeternum C2 and Its Blockchain-Based Control Mechanism For years, the method...

Windows 11 Update Enhances BitLocker and Sysmon

Schubert Jonckheer and Kolbe LLP Launches Investigation into QualDerm Partners Data Breach In response to...

Hackers Utilize 1Campaign to Conceal Malicious Ads from Google Reviewers

New Cloaking Platform 1Campaign: A Threatening Tool for Cybercriminals In a recent analysis, cybersecurity researchers...

Google Thwarts Hackers Linked to China – CyberMaterial

Google has recently taken significant measures to dismantle a large-scale surveillance operation associated with...

More like this

New Aeternum C2 Botnet Avoids Takedowns Using Polygon Blockchain

The Evolution of Botnets: Aeternum C2 and Its Blockchain-Based Control Mechanism For years, the method...

Windows 11 Update Enhances BitLocker and Sysmon

Schubert Jonckheer and Kolbe LLP Launches Investigation into QualDerm Partners Data Breach In response to...

Hackers Utilize 1Campaign to Conceal Malicious Ads from Google Reviewers

New Cloaking Platform 1Campaign: A Threatening Tool for Cybercriminals In a recent analysis, cybersecurity researchers...