Dubai Telegraph - 'World's most harmful': What is the LockBit cybercrime gang?

EUR -
AED 3.883446
AFN 71.895736
ALL 97.900638
AMD 411.253615
ANG 1.90568
AOA 964.776505
ARS 1059.179559
AUD 1.622625
AWG 1.897279
AZN 1.794959
BAM 1.957984
BBD 2.134981
BDT 126.360933
BGN 1.952776
BHD 0.398504
BIF 3064.552793
BMD 1.057289
BND 1.41652
BOB 7.333387
BRL 6.114624
BSD 1.057409
BTN 89.29813
BWP 14.386045
BYN 3.460359
BYR 20722.868637
BZD 2.131438
CAD 1.478328
CDF 3035.47747
CHF 0.934506
CLF 0.037204
CLP 1026.5747
CNY 7.654248
CNH 7.656799
COP 4647.515635
CRC 537.514753
CUC 1.057289
CUP 28.018164
CVE 110.53916
CZK 25.294629
DJF 187.901514
DKK 7.459164
DOP 64.018911
DZD 140.877325
EGP 52.381066
ERN 15.859338
ETB 128.751425
FJD 2.395923
FKP 0.834536
GBP 0.83492
GEL 2.881119
GGP 0.834536
GHS 16.87422
GIP 0.834536
GMD 75.067091
GNF 9125.463708
GTQ 8.163336
GYD 221.116616
HKD 8.229136
HNL 26.617242
HRK 7.541918
HTG 138.904923
HUF 407.915932
IDR 16767.866866
ILS 3.957687
IMP 0.834536
INR 89.227706
IQD 1385.577518
IRR 44503.944681
ISK 145.504269
JEP 0.834536
JMD 167.707047
JOD 0.749935
JPY 163.649346
KES 135.859859
KGS 91.447738
KHR 4283.078889
KMF 491.374875
KPW 951.559894
KRW 1474.675567
KWD 0.325064
KYD 0.881183
KZT 524.710108
LAK 23207.498531
LBP 94733.114058
LKR 307.643121
LRD 192.444637
LSL 18.973037
LTL 3.1219
LVL 0.639544
LYD 5.164848
MAD 10.575017
MDL 19.217434
MGA 4926.967975
MKD 61.463334
MMK 3434.034132
MNT 3592.6687
MOP 8.477055
MRU 42.212296
MUR 48.931243
MVR 16.345495
MWK 1834.396561
MXN 21.312159
MYR 4.729253
MZN 67.587204
NAD 18.978021
NGN 1775.828054
NIO 38.855402
NOK 11.632492
NPR 142.877408
NZD 1.79237
OMR 0.407066
PAB 1.057409
PEN 4.012387
PGK 4.252446
PHP 62.246315
PKR 293.715725
PLN 4.334931
PYG 8235.184869
QAR 3.849065
RON 4.976764
RSD 116.97634
RUB 106.338364
RWF 1448.486226
SAR 3.969218
SBD 8.849003
SCR 14.364561
SDG 635.957428
SEK 11.567035
SGD 1.416107
SHP 0.834536
SLE 23.947671
SLL 22170.831226
SOS 604.244517
SRD 37.574471
STD 21883.752116
SVC 9.252319
SYP 2656.470724
SZL 18.978078
THB 36.516676
TJS 11.239936
TMT 3.700512
TND 3.341085
TOP 2.476276
TRY 36.480924
TTD 7.180212
TWD 34.260928
TZS 2806.026596
UAH 43.654088
UGX 3893.342324
USD 1.057289
UYU 45.390625
UZS 13559.734259
VES 48.349526
VND 26860.432537
VUV 125.5235
WST 2.951519
XAF 656.708074
XAG 0.033917
XAU 0.000402
XCD 2.857377
XDR 0.804297
XOF 655.519126
XPF 119.331742
YER 264.163785
ZAR 19.106588
ZMK 9516.868831
ZMW 29.211409
ZWL 340.446696
  • CMSC

    -0.0290

    24.595

    -0.12%

  • CMSD

    -0.0800

    24.31

    -0.33%

  • RBGPF

    -0.4400

    59.75

    -0.74%

  • BTI

    0.2650

    36.945

    +0.72%

  • RIO

    0.2550

    62.375

    +0.41%

  • GSK

    -0.2400

    33.45

    -0.72%

  • SCS

    -0.0750

    13.125

    -0.57%

  • RYCEF

    -0.1700

    6.68

    -2.54%

  • BCC

    -3.0900

    138.45

    -2.23%

  • RELX

    0.2600

    45.3

    +0.57%

  • BP

    -0.3950

    29.025

    -1.36%

  • JRI

    0.0160

    13.246

    +0.12%

  • AZN

    0.3700

    63.76

    +0.58%

  • VOD

    -0.0250

    8.895

    -0.28%

  • BCE

    -0.0250

    27.205

    -0.09%

  • NGG

    0.7830

    63.683

    +1.23%

'World's most harmful': What is the LockBit cybercrime gang?
'World's most harmful': What is the LockBit cybercrime gang? / Photo: PAUL FAITH - AFP/File

'World's most harmful': What is the LockBit cybercrime gang?

An international law enforcement operation has taken down dozens of servers and disrupted LockBit, "the world's most harmful cyber crime group" according to British authorities.

Text size:

LockBit and its affiliates caused billions of dollars in damage and extracted tens of millions in ransom from their victims. Their targets have included banks, mail services and even a children's hospital.

How does LockBit operate?

Rather than conduct an entire criminal operation itself, LockBit developed the malicious software -- "ransomware" -- that enables attackers to lock victims out of their computers and networks.

Victims were then told to pay ransom in cryptocurrency in exchange for regaining access to their data. Those who did not pay risked having their data dumped on the dark web.

The "LockBit" ransomware was first observed in 2020, and made money through up-front payments and subscription fees for the software, or from a cut of the ransom, according to the US Cybersecurity & Infrastructure Security Agency (CISA).

The model is known as "Ransomware as a Service", or RaaS.

LockBit usually conducted itself as a professional enterprise, seeking feedback from customers -- called "affiliates" -- and rolling out ransomware improvements.

"LockBit operates like a business. They run -- or ran -- a tight ship, which has enabled them to outlast many other ransomware operations," Brett Callow, a threat analyst at the cybersecurity firm Emsisoft, told AFP.

LockBit is believed to have operated out of multiple locations, and cybersecurity experts say its members were Russian speakers.

How lucrative is ransomware?

In 2023, extortions by ransomware groups exceeded $1 billion in cryptocurrency for the first time, according to data published this month by blockchain firm Chainalysis.

LockBit has targeted more than 2,000 victims worldwide, receiving more than $120 million in ransom, the US Department of Justice said Tuesday.

These potentially huge payouts have emboldened cybercriminals.

"Awash with money, the ransomware ecosystem surged in 2023 and continued to evolve its tactics," the cybersecurity firm MalwareBytes said in a report published this month.

"The number of known attacks increased 68 percent, average ransom demands climbed precipitously, and the largest ransom demand of the year was a staggering $80 million."

That demand came after a LockBit attack severely disrupted Britain's post operator Royal Mail for weeks.

Who are LockBit's victims?

LockBit ransomware has been used against a wide variety of targets, from small businesses and individuals to huge corporations.

It was used "for more than twice as many attacks as its nearest competitor in 2023", according to MalwareBytes.

The group has gained notoriety and attention from law enforcement agencies after high-profile attacks such as the one on Royal Mail.

Last November, it was blamed for an attack on the US arm of the Industrial and Commercial Bank of China (ICBC) -- one of the biggest financial institutions in the world -- as well as US aerospace giant Boeing.

In 2022, a LockBit affiliate attacked the Hospital for Sick Children in Toronto, Canada, disrupting lab and imaging results. LockBit reportedly apologised for that attack.

"Although LockBit developers have created rules stipulating that their ransomware will not be used against critical infrastructure, it is clear that LockBit affiliates largely disregard these rules," Stacey Cook, an analyst at the cybersecurity firm Dragos, wrote in a report published last year.

"LockBit developers do not appear to be overly concerned with holding their affiliates accountable."

Who is fighting back, and how?

LockBit's growing visibility and its affiliates' increasing attacks meant law enforcement agencies ramped up their efforts to win this cat-and-mouse game.

An alliance of agencies from 10 nations, led by Britain's National Crime Agency, on Tuesday said they had disrupted LockBit at "every level" in an effort codenamed "Operation Cronos".

Europol said 34 servers in Europe, Australia, the United States and Britain were taken down and 200 Lockbit-linked cryptocurrency accounts were frozen.

The NCA said the action had compromised LockBit's "entire criminal enterprise".

"This likely spells the end of LockBit as a brand. The operation has been compromised and other cybercriminals will not want to do business with them," Emsisoft's Callow told AFP.

But in recent years, cybersecurity experts have detected ransomware groups that suspended operations following law enforcement action only to re-emerge under different names.

"Our work does not stop here. LockBit may seek to rebuild their criminal enterprise," NCA Director General Graeme Biggar said in a statement.

"However, we know who they are, and how they operate. We are tenacious and we will not stop in our efforts to target this group and anyone associated with them."

G.Mukherjee--DT