Original Article Text

Click to Toggle View

FBI recovers 7,000 LockBit keys, urges ransomware victims to reach out. The FBI urges past victims of LockBit ransomware attacks to come forward after revealing that it has obtained over 7,000 LockBit decryption keys that they can use to recover encrypted data for free. FBI Cyber Division Assistant Director Bryan Vorndran announced this on Wednesday at the 2024 Boston Conference on Cyber Security. "From our ongoing disruption of LockBit, we now have over 7,000 decryption keys and can help victims reclaim their data and get back online," the FBI Cyber Lead said in a keynote. "We are reaching out to known LockBit victims and encouraging anyone who suspects they were a victim to visit our Internet Crime Complaint Center at ic3.gov." This call to action comes after law enforcement took down LockBit's infrastructure in February 2024 in an international operation dubbed "Operation Cronos." At the time, police seized 34 servers containing over 2,500 decryption keys, which helped create a free LockBit 3.0 Black Ransomware decryptor. After analyzing the seized data, the U.K.'s National Crime Agency and the U.S. Justice Department estimate the gang and its affiliates have raked in up to $1 billion in ransoms following 7,000 attacks targeting organizations worldwide between June 2022 and February 2024. ​​However, despite law enforcement efforts to shut down its operations, LockBit is still active and has since switched to new servers and dark web domains. They are still targeting victims around the world and, in retaliation to the recent infrastructure takedown by U.S. and U.K. authorities, they've kept leaking massive amounts of old and new stolen data on the dark web. Most recently, LockBit claimed the April 2024 cyberattack on Canadian pharmacy chain London Drugs after another law enforcement operation that doxxed the gang's leader, a 31-year-old Russian national named Dmitry Yuryevich Khoroshev who's been using the "LockBitSupp" online alias. In recent years, other Lockbit ransomware actors have been arrested and charged, including Mikhail Vasiliev(November 2022), Ruslan Magomedovich Astamirov (June 2023), Mikhail Pavlovich Matveev aka Wazawaka (May 2023), Artur Sungatov and Ivan Gennadievich Kondratiev aka Bassterlord (February 2024). The U.S. State Department now offers $10 million for any information that would lead to LockBit leadership arrest or conviction and an extra $5 million reward for tips leading to the arrest of LockBit ransomware affiliates.

Daily Brief Summary

RANSOMWARE // FBI Recovers LockBit Decryption Keys, Urges Victim Contact

The FBI has acquired over 7,000 LockBit ransomware decryption keys following an international law enforcement operation.

FBI Cyber Division Assistant Director Bryan Vorndran announced at the 2024 Boston Conference on Cyber Security that these keys can assist victims in recovering their encrypted data free of charge.

The international operation, named "Operation Cronos," dismantled LockBit's infrastructure in February 2024, during which authorities seized 34 servers.

The operation resulted in the discovery of approximately 2,500 decryption keys, aiding the creation of the free LockBit 3.0 Black Ransomware decryptor.

Despite significant disruptions, LockBit remains active, continuing global targeting and leaking sensitive data on dark web platforms.

The group has managed to accumulate roughly $1 billion in ransoms from about 7,000 attacks between June 2022 and February 2024.

Recent activities include a cyberattack on Canadian pharmacy chain London Drugs in April 2024, subsequent to another law enforcement sting operation.

The U.S. State Department is offering a reward of up to $10 million for information leading to the arrest or conviction of the LockBit leadership.