close
close

Lockbit Ransomware Group Hacked, 60k Bitcoin addresses leaked through

A massive leak only rocked the cyber criminal world. Almost 60,000 Bitcoin addresses associated with the notorious Lockbit -Ransomware group were exposed online after Hacker had violated the Dark Web Affiliate panel. It is a big blow to the group and gives the law enforcement and blockchain experts a rare opportunity to pursue their financial movements.

The hackers not only stolen data – they had something to say. They left a mocking message: “Crime no crime. Crime is bad Xoxo from Prague.” It is a sharp push at LockBit that has terrorized goals worldwide, and now the tables have turned.

What is in the leak?

The violation contained a MySQL database dump that was publicly shared. The data contained 20 tables that revealed a lot about Lockbits processes. In a table, ransomware programs were listed, which were created by the affiliated companies in the group, while another over 4,400 messages between victims and attracting bites were exchanged during the ransom negotiations.

The leak also revealed a massive list of Bitcoin addresses used by the group, although luckily there were no private keys for attract bites, which means that the wallets cannot be drained directly.

Nevertheless, it is a massive leak. A user on X (formerly Twitter) even shared a conversation with someone he claimed that he was an attraction operator. The operator confirmed the violation, but insisted that no sensitive data such as private keys had been exposed. In view of the leak's scale, it is difficult to believe that this is all that was affected.

Why is it important

Lockbit, like most ransomware groups, uses a unique Bitcoin address for every victim, so that they can pursue ransom payments and make it more difficult to pursue where the means end up.

After almost 60,000 addresses are public, the investigators have a unique chance of pursuing these payments, combining the points and possibly uncovering how attraction works. It is a rare opportunity to follow the Financial Trail, and could lead to more being uncovered via the global ransomware ecosystem.

Who did that?

At this point we do not know who hacked the Panel from Lockbit or how you did it. However, cybersecurity analysts have pointed out that the message left behind in this hack, which was used in a violation of the Everest Ransomware Group's website. This has brought some to the assumption that the same group is behind both attacks.

It was already under the microscope. As early as February 2024, a coalition of law enforcement agencies from 10 countries started a larger operation to disturb the group, which is associated with damage of billions of dollars. They have targeted everything from hospitals to government agencies to large companies.

Crypto's role in ransomware

This injury again underlines the growing connection between cryptocurrency and cybercrime. Bitcoin has been paying for ransomware gangs for years, especially because it is pseudo-anonymous. But with blockchain transparency, the investigators can still track where the money is going when they know where to look for.

With 60,000 Bitcoin addresses, this leak could be a turning point in the fight against crypto-powered ransomware. For LockBit, it is a painful memory that even the greatest players in the cyber criminal world are not safe to be hacked.

Also read: Curve Finance X Account chopped to advertise fake CRV -Airdrop



Leave a Comment