HomeCyber BalkansLockBit Ransomware Gang Accumulated $91 Million in Earnings

LockBit Ransomware Gang Accumulated $91 Million in Earnings

Published on

spot_img

LockBit, a notorious ransomware, has emerged as one of the most prevalent threats in 2022, causing havoc for organizations of all sizes and industries. This ransomware is deployed by a Ransomware-as-a-Service (RaaS) group, with affiliates operating anonymously across the globe.

The LockBit gang has been actively recruiting affiliates to carry out ransomware attacks in various sectors, including government, agriculture, and education. To attract more participants, the group has even conducted attention-grabbing stunts. Their widespread activities have resulted in enormous profits, with recent reports from the Cybersecurity and Infrastructure Security Agency (CISA) estimating their revenue from ransom payments to be around $91 million in the United States alone. This makes LockBit one of the highest-earning malware groups in history.

The attack timeline of LockBit reveals its evolution over the years. It was initially discovered as part of the ABCD ransomware activity in 2019. In 2020, the first version of LockBit ransomware appeared, primarily targeting Russian users. The ransomware then progressed to version 2 in June 2021 and version 3 in March 2022.

LockBit has caused significant disruption worldwide, with 18% of reported ransomware incidents in the United States involving this malicious software between April 2022 and March 2023. In Canada, LockBit accounted for 22% of all ransomware reports in 2022. The Federal Bureau of Investigation (FBI) also revealed that the United States experienced 1700 successful LockBit ransomware attacks.

The LockBit gang’s affiliates are known to exploit a range of vulnerabilities, both old and new, to gain unauthorized access. Some of the common vulnerabilities targeted by these affiliates include:

– CVE-2023-0669: Fortra GoAnywhere Managed File Transfer (MFT) Remote Code Execution Vulnerability.
– CVE-2023-27350: PaperCut MF/NG Improper Access Control Vulnerability.
– CVE-2021-44228: Apache Log4j2 Remote Code Execution Vulnerability.
– CVE-2021-22986: F5 BIG-IP and BIG-IQ Centralized Management iControl REST Remote Code Execution Vulnerability.
– CVE-2020-1472: NetLogon Privilege Escalation Vulnerability.
– CVE-2019-0708: Microsoft Remote Desktop Services Remote Code Execution Vulnerability.
– CVE-2018-13379: Fortinet FortiOS Secure Sockets Layer (SSL) Virtual Private Network (VPN) Path Traversal Vulnerability.

To mitigate the risks associated with LockBit and similar ransomware attacks, organizations are advised to implement the following measures:

1. Keep all operating systems, hardware, firmware, and software up to date. Regularly install patches and security updates to address vulnerabilities.
2. Control and restrict network connections to prevent unauthorized access.
3. Apply local execution policies for applications to limit their capabilities and prevent the execution of malicious code.
4. Disable unused ports to reduce potential attack vectors.
5. Monitor and investigate any abnormal activity or suspicious behavior on the network.
6. Utilize web filtering solutions to block access to malicious websites and prevent phishing attempts.
7. Maintain offline backups of critical data and ensure they are encrypted to prevent unauthorized access.
8. Develop and regularly update a comprehensive recovery plan to ensure a swift response and restoration in the event of an attack.

By implementing these mitigations, organizations can significantly reduce their exposure to LockBit and other ransomware threats. It is crucial to remain vigilant, stay informed about the latest cyber threats, and proactively protect against them to safeguard sensitive information and maintain business continuity.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...