{"id":19780,"date":"2024-02-19T22:07:28","date_gmt":"2024-02-19T22:07:28","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=19780"},"modified":"2024-02-20T12:59:47","modified_gmt":"2024-02-20T12:59:47","slug":"lockbit-ransomware-taken-down","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/lockbit-ransomware-taken-down\/","title":{"rendered":"LockBit Ransomware Taken Down by NCA"},"content":{"rendered":"<p>On February 19, 2024, <strong>LockBit ransomware was taken down by the UK National Crime Agency<\/strong> in cooperation with a selection of other law enforcement agencies. The banner typical for such takedowns now illustrates all the web assets of LockBit ransomware. There is quite a hope about the possible release of decryption keys and even a decryptor tool.<\/p>\n<h2>LockBit Taken Down by NCA<\/h2>\n<p>On February 19, 2024, analysts noticed that the LockBit leak site on the Darknet went offline. Some time after, <strong>a banner stating about the takedown appeared<\/strong>. On that banner, the UK National Crime Agency claims about this being the result of a successful multinational law enforcement cooperation, called Operation Cronos. The text also contains the offer <strong>to visit the page the next day<\/strong> \u2013 on February 20 \u2013 to get more information.<\/p>\n<p><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/lockbit-takedown.webp\" alt=\"LockBit takedown NCA banner\" width=\"1535\" height=\"862\" class=\"aligncenter size-full wp-image-19786\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/lockbit-takedown.webp 1535w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/lockbit-takedown-300x168.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/lockbit-takedown-1024x575.webp 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/lockbit-takedown-768x431.webp 768w\" sizes=\"auto, (max-width: 1535px) 100vw, 1535px\" \/><\/p>\n<p>That is not the first network asset takeover from law enforcement that high-end ransomware group suffers. A couple of months ago, <strong>a similar story happened to ALPHV\/BlackCat<\/strong>, another infamous ransomware group. In their case, however, not all Onion websites were down, and they managed to get the access back. That in fact turned into a comic story, where the access to the site <a href=\"https:\/\/gridinsoft.com\/blogs\/alphv-ransomware-site-taken-fbi\/\">was more like a reversed hot potatoes game<\/a>.<\/p>\n<p>Nonetheless, the current takedown appears to be as serious as it can be. <strong>All the mirrors of their main Darknet site<\/strong> are now having the said banner. Well, it is possible for any miraculous thing to happen, but in my humble opinion, <a href=\"https:\/\/gridinsoft.com\/darknet\">their onion infrastructure<\/a> is done. Either this, or NCA will be quite ashamed for announcing details disclosure on 11:30 GMT, and failing to fulfill the promise.<\/p>\n<h3>International Law Enforcement Blocks LockBit Infrastructure<\/h3>\n<p>Shortly after the original news release, the info from LockBit affiliates arrived. <strong>VX-Undeground team shares a unique info and a screenshot<\/strong> taken by one of the gang members upon the attempt to log into the system.<\/p>\n<p><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/lockbit-affiliate-screenshot.jpg\" alt=\"Affiliate Screenshot \" width=\"2047\" height=\"878\" class=\"aligncenter size-full wp-image-19818\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/lockbit-affiliate-screenshot.jpg 2047w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/lockbit-affiliate-screenshot-300x129.jpg 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/lockbit-affiliate-screenshot-1024x439.jpg 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/lockbit-affiliate-screenshot-768x329.jpg 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/lockbit-affiliate-screenshot-1536x659.jpg 1536w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/lockbit-affiliate-screenshot-1568x673.jpg 1568w\" sizes=\"auto, (max-width: 2047px) 100vw, 2047px\" \/><\/p>\n<p>The text states the following:<\/p>\n<div class=\"su-quote su-quote-style-default\"><div class=\"su-quote-inner su-u-clearfix su-u-trim\">\nHello [removed]\n<p>Law Enforcement has taken control of Lockbit&#8217;s platform and obtained all the information held on there. This information relates to the Lockbit group and you, their affiliate. We have source code, details of the victims you have attacked, the amount of money extorted, the data stolen, chats, and much, much more. You can thank Lockbitsupp and their flawed infrastructure for this situation&#8230; we may be in touch with you very soon.<br \/>\nIf you would like to contact us directly, please get in touch: [removed]\n<p>In the meantime, we would encourage you to visit the Lockbit leaksite.<br \/>\nHave a nice day.<br \/>\nRegards,<br \/>\nThe National Crime Agency of the UK, the FBI, Europol, and the Operation Cronos Law Enforcement<br \/>\n<\/div><\/div>\n<p>Another piece of info comes from the gang\u2019s Tox chat. In a short message, <strong>they say about the PHP servers being taken over<\/strong>, while the non-PHP reserve servers being OK. Considering the use of obscene language, non-typical for LockBit representatives, the situation is rather tense, to say the least.<\/p>\n<p><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/lockbit-tox-chat.webp\" alt=\"Tox note VXUG\" width=\"740\" height=\"342\" class=\"aligncenter size-full wp-image-19821\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/lockbit-tox-chat.webp 740w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/lockbit-tox-chat-300x139.webp 300w\" sizes=\"auto, (max-width: 740px) 100vw, 740px\" \/><\/p>\n<h2>LockBit Decryptor Coming Soon?<\/h2>\n<p>What is more exciting than the info that will be published tomorrow is the thing that will follow. The takedown supposes <strong>leaking the decryption keys<\/strong> along with their proprietary decryptor tool. Maybe not all of them are available that easily, but accessing such a large chunk of internal info is definitely a key for exposing it all.<\/p>\n<p>The fact of the leak and the decryptor being available <strong>is just miraculous for the victims<\/strong>. Sure enough, this will not delete the data the frauds have stolen from the network. But getting all the files back at no cost is much more important. And since it will work even for victims that failed the payment deadline, the question arises once again \u2013 <strong>why would you pay the ransom<\/strong>? It may be a much more reasonable option to just wait, and it looks like more and more ransomware victims stick to that opinion.<\/p>\n<h2>UPD 20.02 \u2013 LockBit Darknet Site Filled With Leaks and Announcements<\/h2>\n<p>On the designated time of 11:30 GMT on February 20, all of the LockBit\u2019s sites that were taken over started redirecting to what used to be their leak page. Now, <strong>it is filled with the information gathered by law enforcement agencies<\/strong>. In particular, the information about the backend structure of the cybercrime network was revealed, demonstrating the screenshots of seized servers.<\/p>\n<p><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/lockbit-takeover.png\" alt=\"LockBit site law enforcement leaks\" width=\"1692\" height=\"778\" class=\"aligncenter size-full wp-image-19831\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/lockbit-takeover.png 1692w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/lockbit-takeover-300x138.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/lockbit-takeover-1024x471.png 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/lockbit-takeover-768x353.png 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/lockbit-takeover-1536x706.png 1536w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/lockbit-takeover-1568x721.png 1568w\" sizes=\"auto, (max-width: 1692px) 100vw, 1692px\" \/><\/p>\n<p>Aside from that, law enforcement added a tempting one \u2013 the info about the admin of the group, known as LockBitSupp. \u201cThe $10m question\u201d will be answered <strong>on February 23, 2024<\/strong>. Some of the lower-ranked staff have already been arrested in Poland and Ukraine. Well, LockBitSupp did not lie by saying their group is multi-national.<\/p>\n<p><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/lockbit-decrypt.png\" alt=\"Decryptor tools LockBit\" width=\"1642\" height=\"638\" class=\"aligncenter size-full wp-image-19832\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/lockbit-decrypt.png 1642w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/lockbit-decrypt-300x117.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/lockbit-decrypt-1024x398.png 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/lockbit-decrypt-768x298.png 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/lockbit-decrypt-1536x597.png 1536w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/lockbit-decrypt-1568x609.png 1568w\" sizes=\"auto, (max-width: 1642px) 100vw, 1642px\" \/><\/p>\n<p>What is even better news is the confirmation of decryption keys release, as I\u2019ve predicted in the original text. The keys, along with recovery tools, will be available to any victim upon <strong>contacting NCA for UK residents, IC3 for US and NoMoreRansom project<\/strong> for others.<\/p>\n<h2>What is LockBit Ransomware?<\/h2>\n<p>LockBit is one of the most successful ransomware groups <a href=\"https:\/\/gridinsoft.com\/ransomware\/lockbit\">that are currently active<\/a> on the ransomware market. Its efficient software and meticulous attack planning rendered them dominant over the last few years. Their ransom sums are large, attacks are rapid and methods are as unprincipled as you can ever imagine. To be brief \u2013 <strong>nothing short of leaders in the cybercrime industry<\/strong>.<\/p>\n<figure id=\"attachment_12701\" aria-describedby=\"caption-attachment-12701\" style=\"width: 800px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/12\/lockbit-ransom-note.png\" alt=\"LockBit ransom note\" width=\"800\" height=\"433\" class=\"size-full wp-image-12701\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/12\/lockbit-ransom-note.png 800w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/12\/lockbit-ransom-note-300x162.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/12\/lockbit-ransom-note-768x416.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><figcaption id=\"caption-attachment-12701\" class=\"wp-caption-text\">Ransom note may appear as a wallpaper on the desktop of the attacked system<\/figcaption><\/figure>\n<p>It is obvious that LockBit will eventually become a target for law enforcement, sooner or later. <strong>They were attacked before<\/strong>, but in a more mild form, that led to the temporal downtime or the urgent shift to a different software. Still, they were recognizing their mistakes and <strong>opening the entire bug bounty programs<\/strong> (!!) for people who can find issues in their software. This, along with continuous modernization of their software and updates to the online infrastructure is what made LockBit the image of unbreakable. And that is why the fact of the takedown set the community abuzz.<\/p>\n<p style=\"padding-top:15px;padding-bottom:15px;\"><a href=\"\/download\/antimalware\" rel=\"nofollow\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"\/blogs\/wp-content\/uploads\/2022\/07\/env02.webp\" alt=\"LockBit Ransomware Taken Down by NCA\" width=\"798\" height=\"336\" class=\"aligncenter size-full\" title=\"\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On February 19, 2024, LockBit ransomware was taken down by the UK National Crime Agency in cooperation with a selection of other law enforcement agencies. The banner typical for such takedowns now illustrates all the web assets of LockBit ransomware. There is quite a hope about the possible release of decryption keys and even a [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":19794,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[619,649,951,55],"class_list":{"0":"post-19780","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-cybersecurity","9":"tag-lockbit","10":"tag-lockbit-3-0","11":"tag-ransomware"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/lockbit-taken-down-by-nca.jpg","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/19780","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=19780"}],"version-history":[{"count":8,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/19780\/revisions"}],"predecessor-version":[{"id":19833,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/19780\/revisions\/19833"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/19794"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=19780"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=19780"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=19780"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}