The Menace of LockBit Ransomware: Kerala-Based Companies Among the Latest Victims
In a worrying development, the notorious Russian ransomware group, LockBit, has claimed responsibility for breaching the computer systems of two Kerala-based companies. This revelation came through LockBit's dark web portal, where they listed four Indian companies as their latest victims, including Thrissur-based food production giant Double Horse and garment manufacturer V-Star in Ernakulam.
LockBit's Targets: A Growing List of Indian Companies
LockBit's latest attack extends beyond Kerala, affecting Hyderabad-based pharmaceutical company Hetero and Vadodara's automobile parts manufacturer Vikrant Group. The ransomware group shares images of sensitive information, including bank account details, invoices, purchase orders, supply details, and even employee driving licenses. These pictures suggest that LockBit has compromised individual employee computers or laptops.
The Modus Operandi of LockBit
LockBit ransomware infiltrates computer systems, locking them and demanding a ransom. Failure to pay results in permanent locking of the system and dumping of the accessed data on the dark web. This form of cyber extortion is a growing threat, with LockBit responsible for about 20% of ransomware attacks last year, targeting high-profile entities such as Royal Mail, the UK's National Health Service, Boeing, and numerous international banks.
V-Star's IT officials have acknowledged a cyber attack on their attendance system but reassured that their cloud-based operations remain unaffected. Double Horse has yet to respond publicly to the incident. While the ransom amount remains undisclosed, LockBit has set a deadline of May 15 for payment.
Broader Implications and Response
Falconfeeds.io, a private cybersecurity firm, brought this data breach to light. Its CEO, Nandakishore Harikumar, emphasized the uncertainty surrounding the breach's full impact. He noted that many companies fail to report such incidents to authorities or the Indian Computer Emergency Response Team (CERT-IN), often due to unawareness or reluctance.
LockBit has shown resilience, continuing its operations despite a crackdown by the FBI and other international law enforcement agencies earlier this year. The group has since revived with a more aggressive 3.0 version, known as LockBit Black. Recently, the US government announced a $10 million bounty on Dimitry Yuryevich Khoroshev, identified as the mastermind behind LockBit.
The State of Cybersecurity in India
Reports indicate that 22 Indian companies were targeted by LockBit last year. The ransomware group operates like an organized crime syndicate, exploiting system vulnerabilities to hack into an average of 20 companies daily. They reportedly extorted $120 million in ransom last year, often facilitated through Bitcoin. Weak security protocols and outdated operating systems are major contributing factors to such breaches.
The increasing frequency and sophistication of ransomware attacks underscore the need for robust cybersecurity measures. Companies must prioritize updating their operating systems and implementing comprehensive security protocols to protect against such threats. Awareness and prompt reporting of breaches to relevant authorities can also mitigate the damage and enhance collective cybersecurity resilience.
- Other (42)
- Ransomware (128)
- Events and News (26)
- Features (45)
- Security (433)
- Tips (79)
- Google (22)
- Achievements (9)
- Products (33)
- Activation (7)
- Dealers (1)
- Bank Phishing (42)
- Malware Alerts (195)
- Cyber Attack (221)
- Data Backup (11)
- Data Breach (80)
- Phishing (139)
- Securty Tips (1)
- Browser Hijack (16)
- Adware (15)
- Email And Password (67)
- Android Security (56)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (71)
- Hacking (57)
- Social Media (7)
- vulnerability (54)
- Hacker (31)
- Spyware (8)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (3)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (5)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (5)
- IoT Security (1)
- Deals and Offers (1)
- Cloud Security (8)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (1)
- DMart (1)
- Payment Risk (4)
- Occasion (2)
- firewall (1)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (7)
- Impersonation phishing (1)
- DDoS (4)
- Smishing (2)
- Whale (0)
- Whale phishing (3)
- WINRAR (2)
- ZIP (2)