#lockbitransomware

2024-11-30

📬 Verhaftung von Wazawaka: Russland nimmt berüchtigten Ransomware-Entwickler fest
#Malware #Rechtssachen #Babuk #Boriselcin #LockBitRansomware #MikhailPavlovichMatveev #RansomBoris #Wazawaka sc.tarnkappe.info/5bff3f

2024-05-13

What #macos #malware would folks prefer to read a breakdown about? #ecrime such as #lockbitransomware or #APT malware?

2024-04-14

🚨 LockBit ransomware strikes again! 🚨 This time, they've allegedly stolen data from South Africa's pension agency. 😱 Are you prepared for cyber threats? �shield️ Learn how to protect your sensitive information and stay one step ahead of hackers. 🔒 #CyberSecurity #DataProtection #LockBitRansomware
wp.me/peSvjo-uK

2023-12-28

Bloccato il mercato darknet illegale di Kingdom Market. Colpo di Scena nella Rete Oscura, una operazione internazionale chiude Kingdom Market! Le forze dell’ordine tedesche hanno condotto con successo un’operazione per sequestrare i server del mercato della darknet Kingdom Market, noto per la vendita di droga, malware, documenti falsi e altri strumenti per i criminali informatici.

#ALPHV #BlackCat #darknet #Europol #KingdomMarket #LockBitRansomware

scienzamagia.eu/misteri-ufo/bl

🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​H3liumb0y@infosec.exchange
2023-12-28

"🚑 Lockbit 3.0 Ransomware Paralyzes German Hospitals 🏥"

German hospitals under Katholische Hospitalvereinigung Ostwestfalen (KHO) faced a severe disruption due to a Lockbit 3.0 ransomware attack, reported by Bill Toulas on December 27, 2023. This attack on critical healthcare infrastructure in Bielefeld, Rheda-Wiedenbrück, and Herford highlights the dire consequences of such cyber threats, causing the diversion of emergency care services.

Lockbit 3.0, a sophisticated Ransomware-as-a-Service (RaaS), is notorious for its adaptability and evasive techniques. It employs various TTPs, targeting a wide range of businesses and critical infrastructures. Interestingly, Lockbit 3.0 avoids infecting systems with specific language settings, such as Romanian (Moldova), Arabic (Syria), and Tatar (Russia), halting execution if these languages are detected. Initial access is often gained through methods like RDP exploitation, phishing, and abuse of valid accounts.

Source: BleepingComputer, Author: Bill Toulas]

Tags: #LockbitRansomware #CyberAttack #HealthcareCybersecurity #RaaS #CriticalInfrastructure #CyberThreats #Infosec #RansomwareAttack 🌍🔐💻

Mitre - Lockbit 3.0

[MITRE ATT&CK Vectors: T1480.001, T1614.001, T1133, T1189, T1566, T1078, T1190]

Sean Whalen 👨🏼‍🦼🏳️‍🌈🇺🇦🕊️seanthegeek@infosec.exchange
2023-08-17

It's kinda funny that the Lockbit ransomware gang has a bug bounty program.

Screenshot via: bird.makeup/users/vxundergroun Annotation mine.

#Ransomware #InfoSec #Vulnerability #VulnerabilityManagement #BugBounty #Lockbit #LockBitRansomware

A screenshot of the affiliate panel for Lockbit  ransomware with the footer of the page magnified. The footer reads:

"We've been working since September 3, 2019 3 years 346 days 20 hours" and includes a link that reads "Web Security & Bug Bounty"
2023-05-16

Russian Hacker “Wazawaka” Indicted for Ransomware - A Russian man identified by KrebsOnSecurity in January 2022 as a prolific and voca... krebsonsecurity.com/2023/05/ru #mikhailpavolovichmatveev #lockbitransomware #neer-do-wellnews #babukransomware #hiveransomware #uhodiransomwar #boriselcin #wazawaka #orange #ramp

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst