this post was submitted on 27 Feb 2024
35 points (92.7% liked)
Cybersecurity
5984 readers
182 users here now
c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.
THE RULES
Instance Rules
- Be respectful. Everyone should feel welcome here.
- No bigotry - including racism, sexism, ableism, homophobia, transphobia, or xenophobia.
- No Ads / Spamming.
- No pornography.
Community Rules
- Idk, keep it semi-professional?
- Nothing illegal. We're all ethical here.
- Rules will be added/redefined as necessary.
If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.
Learn about hacking
Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected]
Notable mention to [email protected]
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
This is the best summary I could come up with:
Updated LockBit claims it's back in action just days after an international law enforcement effort seized the ransomware gang's servers and websites, and retrieved more than 1,000 decryption keys to assist victims.
The crew's latest leak site, which debuted on Saturday, listed more than a dozen alleged victims including the FBI itself, hospitals, and Georgia's Fulton County, which is still struggling to recover from the intrusion that disrupted its phone, email and other IT systems in late January.
The Georgia county, however, has reappeared on the crew's Tor site, with a countdown clock set to expire on March 2 unless government officials pay the ransom demand.
After confiscating LockBit's infrastructure on February 20, arresting members of the ransomware gang and using its website to leak secrets about the crew's operations, law enforcement promised its big reveal would happen on Friday with the identity of LockBitSupp, the group's public spokesperson.
The site admin also alleges that law enforcement took down LockBit specifically to prevent the release of stolen documents containing "a lot of interesting things and Donald Trump's court cases that could affect the upcoming US election."
"The FBI and its partners anticipated Lockbit threat actors would attempt to regroup and rebuild, however, the opportunity to offer over a thousand victims the ability to decrypt their networks is our focus and we will continue to provide assistance to those who have been impacted," the agency told us.
The original article contains 555 words, the summary contains 236 words. Saved 57%. I'm a bot and I'm open source!