Current:Home > reviewsNotorious ransomware provider LockBit taken over by law enforcement -ThriveEdge Finance
Notorious ransomware provider LockBit taken over by law enforcement
View
Date:2025-04-13 08:47:59
Washington — A ransomware service provider that has targeted over 2,000 systems across the globe, including hospitals in the U.S., with demands for hundreds of millions of dollars was taken down Monday, and Russian nationals were charged as part of an international plot to deploy the malicious software, the Justice Department announced Tuesday.
Known as LockBit, the network of cybercriminals targets critical components of manufacturing, healthcare and logistics across the globe, offering its services to hackers who deploy its malware into vulnerable systems and hold them hostage until a ransom is paid. The attackers have so far extorted more than $120 million from their victims, officials said, and their program has evolved into one of the most notorious and active.
As part of this week's operation, the FBI and its law enforcement partners in the United Kingdom seized numerous public-facing platforms where cybercriminals could initiate contact with and join LockBit. Investigators also seized two servers in the U.S. that were used to transfer stolen victim data.
The front page of LockBit's site has been replaced with the words "this site is now under control of law enforcement," alongside the flags of the U.K., the U.S. and several other nations, the Associated Press noted.
According to Attorney General Merrick Garland, the U.S. and its allies went "a step further" by obtaining the "keys" that can unlock attacked computer systems to help victims "regain access to their data," releasing them from having to pay a ransom. The move could help hundreds of victims worldwide.
Two Russian nationals who allegedly used LockBit's ransomware against companies across the U.S. — in Oregon, New York, Florida and Puerto Rico — were also indicted in New Jersey as part of the Justice Department's latest play against the group.
Artur Sungatov and Ivan Kondratyev joined a growing number of defendants accused by federal prosecutors of attacking American institutions as part of the LockBit scheme. A total of five have now been charged, including an individual who allegedly targeted Washington, D.C.'s police force.
LockBit was the most commonly used version of ransomware in 2022, according to a joint cybersecurity advisory published by the FBI and the Cybersecurity and Infrastructure Security Agency last year, and targeted an "array of critical infrastructure sectors, including financial services, food and agriculture, education, energy, government and emergency services, healthcare, manufacturing, and transportation."
The LockBit network was first seen on Russian-speaking cybercrime platforms in 2020 and continued to evolve and grow, targeting computer platforms and various operating systems. By 2022, 16% of ransomware attacks in the U.S. were deployed by the LockBit group, according to the advisory.
Criminals conventionally gain access to vulnerable systems through phishing emails or when users visit an infected site while browsing the internet. And U.S. officials consistently warn users to avoid paying ransoms and instead contact law enforcement.
Federal investigators have recently developed a new approach to combat ransomware attacks that can be both costly to victims and damaging to the normal functioning of society: arming victims with the tools necessary to counter a malware attack.
Similar to the LockBit operation, in July 2022, the FBI toppled an international ransomware group called Hive and collected decryption keys for its penetrated computer networks it had breached to conduct what officials called a "21st-century high-tech cyber stakeout." FBI agents then distributed the keys to the victims whose networks were being ransomed.
And in August, investigators took down a criminal network known as the Qakbot botnet — a grouping of computers infected by a malware program that was used to carry out cyberattacks. Law enforcement gained access to the QakBot infrastructure and "redirected" the cyber activity to servers controlled by U.S. investigators, who were then able to inject the malware with a program that released the victim computer from the botnet, freeing it of the malicious host.
Victims of LockBit attacks are encouraged to contact the FBI for further assistance.
- In:
- Cyberattack
- Ransomware
- Malware
Robert Legare is a CBS News multiplatform reporter and producer covering the Justice Department, federal courts and investigations. He was previously an associate producer for the "CBS Evening News with Norah O'Donnell."
veryGood! (7)
Related
- Head of the Federal Aviation Administration to resign, allowing Trump to pick his successor
- Why Kim Kardashian Isn't Ready to Talk to Her Kids About Being Upset With Kanye West
- The demise of Credit Suisse
- Need workers? Why not charter a private jet?
- Finally, good retirement news! Southwest pilots' plan is a bright spot, experts say
- TikTok CEO says company is 'not an agent of China or any other country'
- Inside Clean Energy: Some Straight Talk about Renewables and Reliability
- Inside Clean Energy: What Happens When Solar Power Gets Much, Much Cheaper?
- Senate begins final push to expand Social Security benefits for millions of people
- What happens to the body in extreme heat? Experts explain the heat wave's dangerous impact.
Ranking
- Backstage at New York's Jingle Ball with Jimmy Fallon, 'Queer Eye' and Meghan Trainor
- Biden Is Losing His Base on Climate Change, a New Pew Poll Finds. Six in 10 Democrats Don’t Feel He’s Doing Enough
- Inside a bank run
- Activists spread misleading information to fight solar
- The Super Bowl could end in a 'three
- Is the Amazon Approaching a Tipping Point? A New Study Shows the Rainforest Growing Less Resilient
- New Report Expects Global Emissions of Carbon Dioxide to Rebound to Pre-Pandemic High This Year
- Man dies in Death Valley as temperatures hit 121 degrees
Recommendation
North Carolina trustees approve Bill Belichick’s deal ahead of introductory news conference
Inside Clean Energy: Well That Was Fast: Volkswagen Quickly Catching Up to Tesla
Inside a bank run
In Glasgow, COP26 Negotiators Do Little to Cut Emissions, but Allow Oil and Gas Executives to Rest Easy
Behind on your annual reading goal? Books under 200 pages to read before 2024 ends
California enters a contract to make its own affordable insulin
Inside Clean Energy: Indian Point Nuclear Plant Reaches a Contentious End
Fish on Valium: A Multitude of Prescription Drugs Are Contaminating Florida’s Waterways and Marine Life