LockBit victims in the US alone paid over $90m in ransoms since 2020

Seven nations today issued an alert, plus protection tips, about LockBit, the prolific ransomware-as-a-service gang.

The group’s affiliates remains a global scourge, costing US victims alone more than $90 million from roughly 1,700 attacks since 2020, we’re told.

The joint security advisory — issued by the US Cybersecurity and Infrastructure Security Agency (CISA), FBI, Multi-State Information Sharing and Analysis Center (MS-ISAC), and cybersecurity authorities in Australia, Canada, the UK, Germany, France, and New Zealand — includes details of common tools and exploits used by the criminals, along with recommendations to avoid ransomware infections or reduce the impact of future ones.

It’s essentially a mini manual[[PDF]to identifying, stopping, and reporting LockBit activity. The nations also urged victims not to give in to the crew’s demands:

The gang, now on version 3.0 of its data-encrypting-and-stealing malware, began incorporating source code from the Conti ransomware in January, and using encryptors targeting macOS as seen on VirusTotal.

LockBit, both the core crew and its affiliate operators, target organizations across an array of critical infrastructure sectors, including financial services, food and agriculture, education, energy, government and emergency services, healthcare, manufacturing, and transportation.

Some of the more recent victims include Managed Care of North Americaone of the biggest government-backed dental care and insurance providers in the US. Earlier this year, the criminals broke into MCNA’s servers, hung around for 10 days and extracted info on nearly 9 million people.

In January, the gang “formally apologized” for breaking into the systems of Canada’s largest children’s hospital, SickKids, blaming a since-ditched affiliate group for an extortion attack and offering a free decryptor for the victim to recover the files.

But before thinking that the ransomware-as-a-service group has gone soft, it’s worth remembering the gang’s ransomware attack last summer against France’s Center Hospitalier Sud Francilien.

The crew has been linked to Russia, and in May Uncle Sam sanctioned a Russian national, Mikhail Pavlovich Matveev, accused of using LockBit and other ransomware to extort a law enforcement agency and nonprofit healthcare organization in New Jersey, as well as the Metropolitan Police Department in Washington DC, among “numerous” other victim organizations in the US and globally.

These Kremlin ties are another reason not to pay, according to Tom Kellermann, SVP of cyber strategy at Contrast Security.

“Lockbit’s cybercrime wave is significant, notably the proceeds of which helped Russia offset some western economic sanctions,” Kellermann told The Register. “The most nefarious ransomware gangs are affiliated with cybercrime cartels that enjoy a peace mafia with the Russian government.”

MLM, but make it ransomware

LockBit was the most used ransomware in 2022 globally and thus far in 2023, according to the seven countries. This is largely due to the gang’s large number of affiliates, which, in exchange for paying upfront and subscription fees, get a cut of the ransom payments.

They also employ a bunch of publicity stunts to attract new members, including paying people to get LockBit tattoos and hyping a $1 million bounty on information related to the identity of the big boss, who goes by “LockBitSupp.”

“Due to the large number of unconnected affiliates in the operation, LockBit ransomware attacks vary significantly in observed tactics, techniques, and procedures (TTPs),” the advisory notes.

This includes using some 30 freeware and open-source tools, all of which are detailed in the security alert, and the FBI has mapped more than 40 of the gang’s TTPs to the MITRE ATT&CK frameworks.

The criminals have also been spotted exploiting “numerous” CVEs. These include the Fortra GoAnyhwere Managed File Transfer remote code execution (RCE) vulnerability (CVE-2023-0669), the PaperCut MF/NG improper access control flaw (CVE-2023-27350), the Log4j RCE (CVE-2021-44228), the F5 BIG-IP and BIG-IQ Centralized Management iControl REST RCE (CVE-2021-22986), a NetLogon privilege escalation bug (CVE-2020-1472), a Microsoft remote desktop RCE (CVE-2019-0708), and a Fortinet FortiOS SSL-VPN path traversal vulnerability (CVE-2018-13379).

The latter is not to be confused with another critical bug in the FortiOS SSL-VPN that was discovered, patched, and likely exploited this week.

After breaking in, encrypting, and then stealing organizations’ data, LockBit affiliates publish names and sometimes screenshots of stolen data on their leak sites to try to force the victims to pay the ransom demand.

Naming and shaming victims

Between January 2020 and the first quarter of 2023, a total of 1,653 alleged victims have been named on LockBit leak sites — although, according to the cyber agencies, this number only represents “a portion” of the affiliates’ victims since it only includes those who refuse to pay.

Also, the leak sites aren’t a very reliable indicator of when the attacks occurred because the date of data publication “may be months” after the LockBit affiliates initially infected corporate systems, according to the alert.

Given these caveats, here’s a look at how LockBit compares to other ransomware infections across the globe:

From April 1, 2022, to March 31, 2023, LockBit made up 18 percent of total reported Australian ransomware incidents.

In 2022, LockBit was responsible for 22 percent of attributed ransomware incidents in Canada.

In 2022, New Zealand received 15 reports of LockBit ransomware, representing 23 percent of the year’s ransomware reports.

In 2022, 16 percent of the US State, Local, Tribal, and Tribunal government ransomware incidents reported to the MS-ISAC were identified as LockBit attacks. This included ransomware incidents impacting municipal governments, county governments, public higher education and K-12 schools, and emergency services such as law enforcement. ®

Note: This article have been indexed to our site. We do not claim legitimacy, ownership or copyright of any of the content above. To see the article at original source Click Here

Related Posts
Buy an Xbox Series X next year?  That's just the question thumbnail

Buy an Xbox Series X next year? That's just the question

Auteur: RubenPriest, gepost 30 september 2021 om 21:03 – Reageer Voor het derde jaar op rij lijkt het verschrikkelijk moeilijk te worden om een Xbox Series X te kopen. Als je alles op alles zet is het je vast gelukt om aan een Xbox Series X of PlayStation 5 komen. Maar het is bijna een…
Read More
How Much Horsepower Does A Horse Have? thumbnail

How Much Horsepower Does A Horse Have?

Erik Von Weber/Getty Images It's almost impossible to see a car advertisement or read a SlashGear automotive review without hearing about how many horsepower an engine has. This measurement has been around since the 18th century, when inventor James Watt adapted the term from its existing use to measure the power of waterwheels. At the
Read More
Writing an open source GPU driver – without the hardware thumbnail

Writing an open source GPU driver – without the hardware

After six months of reverse-engineering, the new Arm “Valhall” GPUs (Mali-G57, Mali-G78) are getting free and open source Panfrost drivers. With a new compiler, driver patches, and some kernel hacking, these new GPUs are almost ready for upstream. In 2021, there were no Valhall devices running mainline Linux. While a lack of devices poses an…
Read More
Pokemon Legends Arceus krenuo odlično sa prodajom thumbnail

Pokemon Legends Arceus krenuo odlično sa prodajom

Pokemon Legends: Arceus je prodat u 6,5 miliona primeraka nakon samo nedelju dana od lansiranja, što ga čini jednom od najbrže prodavanih Switch igara do sada. Ako se zvanične brojke zadrže, igra će nadmašiti iPokemon Sword and Shield i Pokemon Brilliant Diamond i Shining Pearl, od kojih su oba prodata u 6 miliona primeraka u prvoj…
Read More
Index Of News