7,000 LockBit Keys Recovered by the FBI! Ransomware Victims Encouraged to Reach Out
In a significant breakthrough in the fight against ransomware, the FBI has announced the recovery of over 7,000 decryption keys for LockBit ransomware victims. This milestone, revealed by FBI Cyber Division Assistant Director Bryan Vorndran at the 2024 Boston Conference on Cyber Security, marks a crucial step in assisting victims to reclaim their encrypted data without any cost.
A Call to Action for Victims
The FBI is urging individuals and organizations previously affected by LockBit ransomware to come forward and take advantage of these decryption keys. "From our ongoing disruption of LockBit, we now have over 7,000 decryption keys and can help victims reclaim their data and get back online," said Vorndran. He encouraged anyone who suspects they were a victim to visit the Internet Crime Complaint Center at ic3.gov.
Operation Cronos: A Multinational Effort
The call for action follows the dismantling of LockBit’s infrastructure in February 2024, as part of a multinational operation known as 'Operation Cronos'. This coordinated effort by law enforcement agencies led to the seizure of 34 servers containing over 2,500 decryption keys. These keys facilitated the creation of a free LockBit 3.0 Black Ransomware decryptor, significantly aiding victims in recovering their data.
The Impact of LockBit Ransomware
LockBit has been a notorious player in the ransomware landscape. The U.K.’s National Crime Agency and the U.S. Justice Department estimate that the gang and its associates have amassed up to $1 billion in ransom payments from around 7,000 attacks on organizations worldwide between June 2022 and February 2024. This staggering figure underscores the widespread impact of their criminal activities.
Continued Threat and Recent Attacks
Despite the successful takedown of their infrastructure, the LockBit gang remains active. They have migrated to new servers and dark web domains, continuing their attacks globally. In a retaliatory move, they have been releasing large volumes of both fresh and previously stolen data on the dark web. One of their recent high-profile attacks targeted the Canadian pharmacy chain London Drugs. This incident followed a law enforcement operation that exposed the leader of LockBit, Dmitry Yuryevich Khoroshev, a 31-year-old Russian national known online as ‘LockBitSupp’.
Assistance and Support for Victims
The recovery of these decryption keys offers a beacon of hope for many who have suffered from LockBit’s attacks. Victims are encouraged to utilize the resources provided by the FBI to decrypt their data and restore their systems. This initiative not only aids in immediate data recovery but also strengthens the collective resilience against ransomware attacks.
The FBI's recovery of 7,000 LockBit decryption keys represents a monumental achievement in cybersecurity efforts. It highlights the importance of international cooperation and persistent efforts in combating ransomware. By reaching out to victims and providing the necessary tools for data recovery, the FBI is taking significant steps towards mitigating the impact of ransomware and supporting affected individuals and organizations. If you have been a victim of LockBit ransomware, visit ic3.gov to report your case and access the decryption keys.
- Other (42)
- Ransomware (128)
- Events and News (26)
- Features (45)
- Security (433)
- Tips (79)
- Google (22)
- Achievements (9)
- Products (33)
- Activation (7)
- Dealers (1)
- Bank Phishing (42)
- Malware Alerts (195)
- Cyber Attack (221)
- Data Backup (11)
- Data Breach (80)
- Phishing (139)
- Securty Tips (1)
- Browser Hijack (16)
- Adware (15)
- Email And Password (67)
- Android Security (56)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (71)
- Hacking (57)
- Social Media (7)
- vulnerability (54)
- Hacker (31)
- Spyware (8)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (3)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (5)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (5)
- IoT Security (1)
- Deals and Offers (1)
- Cloud Security (8)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (1)
- DMart (1)
- Payment Risk (4)
- Occasion (2)
- firewall (1)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (7)
- Impersonation phishing (1)
- DDoS (4)
- Smishing (2)
- Whale (0)
- Whale phishing (3)
- WINRAR (2)
- ZIP (2)