February 22, 2024 at 12:51AM
The U.S. State Department offers up to $15 million in rewards for identifying LockBit ransomware leaders. The UK’s National Crime Agency disrupted the Russia-linked gang, with a history of extorting companies. Affiliates carry out attacks using LockBit’s software, and LockBit is known for scaling up and solidifying its control through its affiliates.
Key takeaways from the meeting notes:
1. The U.S. State Department is offering rewards of up to $15 million for information leading to the identification and arrest of key leaders in the LockBit ransomware group.
2. LockBit has been involved in over 2,000 attacks since January 2020, resulting in the payment of over $144 million in ransom.
3. Law enforcement efforts led by the U.K. National Crime Agency have disrupted the LockBit ransomware gang, which has been active for over four years.
4. LockBit operates as a Ransomware-as-a-Service (RaaS) model, using affiliates to carry out attacks and relying on a network of initial access brokers (IABs).
5. The group has been described as the most prolific and destructive ransomware group in recent years, known for its bug bounty program and unique marketing tactics.
6. The group’s takedown has resulted in the arrest of affiliates, seizure of servers and decryption keys, and disruption of its infrastructure.
7. However, the fluid structure of RaaS brands means they may resurface under different names, requiring ongoing law enforcement efforts.
Follow us on Twitter and LinkedIn for more exclusive content.