Marking a pivotal moment, the FBI and the U.K.'s National Crime Agency have scored a significant victory by gaining control of LockBit, a widely feared ransomware group. Their operation targeted LockBit's main website, the platform through which the group pressured victims into paying large ransom amounts. Instead of the original links leading to victims' data, authorities redirected users to press releases, sanctions details, and decryption information. This move marks a crucial step in the fight against cybercrime, as law enforcement takes bold actions to dismantle the operations of a prominent ransomware threat.
In a bold psychological manoeuvre, the law enforcement agencies hinted at having information about the leader of LockBit, known as "LockBitSupp." Although the reveal on Friday did not disclose the identity, authorities claimed to know who LockBitSupp is, where he resides, and his financial worth. Notably, they suggested that LockBitSupp has engaged with law enforcement, sparking intrigue about the nature of their interaction.
Experts suggest that this strategic messaging aims to undermine trust within the cybercrime community, particularly among LockBit's affiliates. By creating doubt and suspicion, law enforcement seeks to disrupt LockBit's operations and provoke a response from its leader. The approach appears tailored to the confident persona of LockBitSupp, who had previously offered a $10 million reward for anyone revealing his identity.
Cybersecurity analysts, including Jon DiMaggio of Analyst1, emphasize the psychological aspect of this operation, aiming to erode trust among cybercriminals and make them less likely to collaborate with LockBit. The strategy seems designed to target LockBitSupp's confidence and reputation.
Kurtis Minder, CEO of GroupSense and a ransomware negotiator, suggests that the messaging campaign might intentionally provoke LockBitSupp to say something incriminating. By insinuating collaboration between LockBitSupp and law enforcement, authorities seek to create distrust among affiliates who rely on LockBit's services.
Law enforcement's tactics also extend to the public relations realm, recognizing the need to win a battle against cybercriminals who have historically operated with impunity. By seizing the LockBit website and using it to disseminate information harmful to the criminal enterprise, authorities aim to turn cybercriminals' tools against them.
Allan Liska, a threat intelligence analyst at Recorded Future, highlights two possible interpretations of the police message about communication with law enforcement. It could suggest that LockBitSupp is an informant, a claim previously made by rival ransomware gangs. Alternatively, law enforcement might have infiltrated LockBitSupp's inner circle, with LockBitSupp unknowingly sharing sensitive information.
In the ongoing fight against online crime, law enforcement recognizes the importance of delivering impactful disruptions. By taking control of LockBit's infrastructure and using it to expose the group's activities, authorities aim to make their actions more marketable and showcase their effectiveness in combating cybercrime.
This event strongly implies a shift in law enforcement's approach, using strategic messaging and website seizures to not only disrupt criminal operations but also to sway public opinion and instil doubt within the cybercriminal community. The battle against ransomware continues, with authorities employing innovative tactics to bring cybercriminals to justice.
Varian, a subsidiary of Siemens Healthineeres, provides software for the oncology department's applications and specializes in offering therapeutic and diagnostic oncology services. The California-based corporation has more than 10,000 employees as of 2021 and had an annual profit of £269 million.
While it is still unclear how LockBit got access to Varian's systems or how much data was stolen, the ransomware gang warned readers of its "victim blog" that if the company did not meet their demands within two weeks, soon, its private databases and patient medical data would be made public. Apparently, Varian has until 17 August to meet the negotiation demands in order to restore their stolen data, if they wish to avoid ‘all databases and patient data’ from being exposed in LockBit’s blog.
The attack is most likely to be a part of ‘triple extortion,’ a strategy usually used by ransomware actors. The strategy involves a three-part attack on an organization that starts with the theft of data that appears to be sensitive before it is encrypted. The corporate victim of the breach can only get their data back and keep it private if they pay a ransom, following which they will receive – in theory – a decryption key from the hackers.
In regards to the breach, Siemens Healthineers – Varian’s parent company confirmed that an internal investigation is ongoing. However, they did not provide any further details of the breach.
“Siemens Healthineers is aware that a segment of our business is allegedly affected by the Lockbit ransomware group[…]Cybersecurity is of utmost importance to Siemens Healthineers, and we are making every effort to continually improve our security and data privacy,” said a spokesperson.
Recent months have witnessed a good many cyberattacks conducted by LockBit against some major companies. According to a report by the US Cybersecurity and Infrastructure Security Agency, in the first quarter of 2023, the ransomware gang has already targeted 1,653 companies. They frequently repurposed freeware and open-source tools for use in network reconnaissance, remote access, tunnelling, credential dumping, and file exfiltration.
Some examples of the LockBit hit companies would be their recent campaign against the port of Nagoya, which ossified supply chains for Japanese automobile company Toyota, and SpaceX in which the ransomware gang claims to have led to a haul of 3,000 proprietary schematics, and an attempt to extort $70 million from Taiwanese chip maker TSMC.
TSMC stated on the issue, saying "TSMC has recently been aware that one of our IT hardware suppliers experienced a cybersecurity incident, which led to the leak of information pertinent to server initial setup and configuration." The company confirms that no customer data has been exposed in the breach.
“After the incident, TSMC has immediately terminated its data exchange with this concerned supplier in accordance with the company’s security protocols and standard operating procedures,” the statement added.
One of the affiliates of LockBit, National Hazard Agency shared screenshots of directory listings of stolen TSMC files on their leak website on Thursday, giving them a deadline of August 6 to pay the ransom amount. However, the ransomware gang did not reveal details of the amount of data it stole from the company.
The blog also gave the company an option to extend the said deadline by 24 hours for $5,000, or to delete all stolen content or download it immediately for $70 million.
Kinmax Technology expertise in networking, cloud computing, storage, security and database management. The company claims to have experienced a breach on 29 June, stating “internal specific testing environment was attacked, and some information was leaked.” The leaked information included “system installation preparation that the company provided to our customers,” Kinmax said.
LockBit is a Russian ransomware gang that first came to light in year 2019. As of the first quarter of 2023, it has a total of 1,653 alleged victims, as per a report released by US cybersecurity firm CISA.
According to the report, since its first known attack in January 2020, the cybercrime group has gathered nearly $91m in ransoms from US victims.
LockBit has also been a reason for a number of high-profile cyberattacks in the UK. This year, the gang has been responsible for the popular Royal Mail attacks, where it demanded a ransom of $80m in Bitcoin. The company however did not pay the ransom, deeming the demand as “ridiculous.” The ransomware gang then responded by exposing the data online, along with the copies of the negotiations held between LockBit and the Royal Mail representatives.
The ransomware gang was also responsible for stealing data from WH Smith, a high-end retailer in the UK. The attack was directed at present and former employees' personal information. Since then, there has been no information indicating whether the business has paid the ransom.