LockBit Ransomware Mastermind Unmasked, Charged

LockBit Ransomware Mastermind Unmasked, Charged

May 7, 2024 at 02:00PM

Russian national Dimitry Yuryevich Khoroshev, also known as LockBitSupp, is the alleged mastermind behind the LockBit ransomware operation. Indicted for creating and operating the LockBit ransomware-as-a-service (RaaS), Khoroshev and affiliates targeted over 2,500 victims in 120 countries, amassing over $500 million in ransom payments. Sanctioned by the US, UK, and Australia, Khoroshev faces a maximum penalty of 185 years in prison.

Key takeaways from the meeting notes:
1. A Russian national, Dimitry Yuryevich Khoroshev, has been identified as the mastermind behind the LockBit ransomware operation and has been charged by the US Justice Department.
2. Khoroshev was involved in designing LockBit, recruiting affiliates, maintaining the RaaS infrastructure, and allegedly receiving over $100 million in ransom payments.
3. LockBit RaaS started operations in September 2019, targeted over 2,500 victims in more than 120 countries, and received at least $500 million in ransom payments.
4. Khoroshev is charged with fraud, extortion, and damaging protected computers, facing a maximum penalty of 185 years in prison.
5. Khoroshev is the sixth individual charged for his role in the LockBit operation, and sanctions were announced against him by the US, UK, and Australia.
6. The LockBit infrastructure was disrupted by an international law enforcement effort, resulting in significant arrests and the closure of rogue accounts.
7. The UK National Crime Agency identified over 7,000 LockBit attacks and believes that the group has extorted over $1 billion from its victims.
8. While LockBit continues to operate, its activity is currently reduced, with the NCA currently in possession of over 2,500 decryption keys to help victims recover their data.
9. Europol announced that over 3,500 LockBit victims in 33 countries were identified, and a free recovery tool is available on the NoMoreRansom site for victims to restore their data.

Full Article