Zürcher Nachrichten - 'World's most harmful': What is the LockBit cybercrime gang?

EUR -
AED 3.883499
AFN 71.615398
ALL 97.964948
AMD 408.53216
ANG 1.896427
AOA 964.805939
ARS 1055.741158
AUD 1.626247
AWG 1.900538
AZN 1.797142
BAM 1.952131
BBD 2.124597
BDT 125.743664
BGN 1.953948
BHD 0.398522
BIF 3107.588652
BMD 1.057323
BND 1.414655
BOB 7.271333
BRL 6.114209
BSD 1.052212
BTN 88.790617
BWP 14.355882
BYN 3.443129
BYR 20723.52596
BZD 2.121004
CAD 1.482456
CDF 3034.516057
CHF 0.934045
CLF 0.037278
CLP 1028.616599
CNY 7.65576
CNH 7.657924
COP 4649.048145
CRC 535.892785
CUC 1.057323
CUP 28.019053
CVE 110.058145
CZK 25.289043
DJF 187.376937
DKK 7.459422
DOP 63.400838
DZD 141.165268
EGP 52.331753
ERN 15.859841
ETB 130.25768
FJD 2.399807
FKP 0.834563
GBP 0.835327
GEL 2.881216
GGP 0.834563
GHS 16.783455
GIP 0.834563
GMD 75.070046
GNF 9067.9567
GTQ 8.12972
GYD 220.146233
HKD 8.227494
HNL 26.580043
HRK 7.542157
HTG 138.230195
HUF 406.433817
IDR 16751.745904
ILS 3.945331
IMP 0.834563
INR 89.24983
IQD 1378.496068
IRR 44505.358261
ISK 144.525419
JEP 0.834563
JMD 167.007687
JOD 0.749961
JPY 162.756874
KES 136.658711
KGS 91.45846
KHR 4252.008315
KMF 491.390569
KPW 951.590077
KRW 1474.473563
KWD 0.325063
KYD 0.876844
KZT 525.033196
LAK 23117.550371
LBP 94229.894127
LKR 306.573792
LRD 193.087091
LSL 19.057082
LTL 3.121999
LVL 0.639564
LYD 5.139316
MAD 10.535598
MDL 19.120064
MGA 4918.708725
MKD 61.55379
MMK 3434.143058
MNT 3592.782658
MOP 8.437142
MRU 41.954147
MUR 48.932955
MVR 16.346446
MWK 1824.670517
MXN 21.415385
MYR 4.725157
MZN 67.589326
NAD 19.057082
NGN 1763.392855
NIO 38.727212
NOK 11.651094
NPR 142.064988
NZD 1.796457
OMR 0.407084
PAB 1.052222
PEN 3.999683
PGK 4.233044
PHP 62.203409
PKR 292.315027
PLN 4.32798
PYG 8201.546341
QAR 3.837587
RON 4.977555
RSD 117.016009
RUB 106.26298
RWF 1445.496848
SAR 3.969163
SBD 8.849283
SCR 14.400772
SDG 635.976973
SEK 11.569652
SGD 1.416019
SHP 0.834563
SLE 23.948434
SLL 22171.534478
SOS 601.375398
SRD 37.434533
STD 21884.446262
SVC 9.207607
SYP 2656.554987
SZL 19.050015
THB 36.556911
TJS 11.196057
TMT 3.70063
TND 3.325849
TOP 2.476357
TRY 36.586719
TTD 7.143574
TWD 34.253349
TZS 2806.115567
UAH 43.578981
UGX 3863.738072
USD 1.057323
UYU 45.125187
UZS 13481.661105
VES 47.877573
VND 26855.997928
VUV 125.527482
WST 2.951613
XAF 654.723346
XAG 0.033674
XAU 0.000403
XCD 2.857468
XDR 0.800488
XOF 654.720256
XPF 119.331742
YER 264.172394
ZAR 19.079304
ZMK 9517.174653
ZMW 29.016326
ZWL 340.457495
  • CMSC

    0.0540

    24.624

    +0.22%

  • RIO

    1.1400

    62.12

    +1.84%

  • SCS

    -0.0300

    13.2

    -0.23%

  • BTI

    0.2900

    36.68

    +0.79%

  • CMSD

    -0.0500

    24.39

    -0.21%

  • BCC

    1.4500

    141.54

    +1.02%

  • BP

    0.4400

    29.42

    +1.5%

  • BCE

    0.4100

    27.23

    +1.51%

  • NGG

    0.1500

    62.9

    +0.24%

  • GSK

    0.3400

    33.69

    +1.01%

  • RBGPF

    59.7500

    59.75

    +100%

  • AZN

    0.1600

    63.39

    +0.25%

  • RYCEF

    0.0800

    6.93

    +1.15%

  • JRI

    0.1300

    13.23

    +0.98%

  • RELX

    0.5900

    45.04

    +1.31%

  • VOD

    0.1500

    8.92

    +1.68%

'World's most harmful': What is the LockBit cybercrime gang?
'World's most harmful': What is the LockBit cybercrime gang? / Photo: PAUL FAITH - AFP/File

'World's most harmful': What is the LockBit cybercrime gang?

An international law enforcement operation has taken down dozens of servers and disrupted LockBit, "the world's most harmful cyber crime group" according to British authorities.

Text size:

LockBit and its affiliates caused billions of dollars in damage and extracted tens of millions in ransom from their victims. Their targets have included banks, mail services and even a children's hospital.

How does LockBit operate?

Rather than conduct an entire criminal operation itself, LockBit developed the malicious software -- "ransomware" -- that enables attackers to lock victims out of their computers and networks.

Victims were then told to pay ransom in cryptocurrency in exchange for regaining access to their data. Those who did not pay risked having their data dumped on the dark web.

The "LockBit" ransomware was first observed in 2020, and made money through up-front payments and subscription fees for the software, or from a cut of the ransom, according to the US Cybersecurity & Infrastructure Security Agency (CISA).

The model is known as "Ransomware as a Service", or RaaS.

LockBit usually conducted itself as a professional enterprise, seeking feedback from customers -- called "affiliates" -- and rolling out ransomware improvements.

"LockBit operates like a business. They run -- or ran -- a tight ship, which has enabled them to outlast many other ransomware operations," Brett Callow, a threat analyst at the cybersecurity firm Emsisoft, told AFP.

LockBit is believed to have operated out of multiple locations, and cybersecurity experts say its members were Russian speakers.

How lucrative is ransomware?

In 2023, extortions by ransomware groups exceeded $1 billion in cryptocurrency for the first time, according to data published this month by blockchain firm Chainalysis.

LockBit has targeted more than 2,000 victims worldwide, receiving more than $120 million in ransom, the US Department of Justice said Tuesday.

These potentially huge payouts have emboldened cybercriminals.

"Awash with money, the ransomware ecosystem surged in 2023 and continued to evolve its tactics," the cybersecurity firm MalwareBytes said in a report published this month.

"The number of known attacks increased 68 percent, average ransom demands climbed precipitously, and the largest ransom demand of the year was a staggering $80 million."

That demand came after a LockBit attack severely disrupted Britain's post operator Royal Mail for weeks.

Who are LockBit's victims?

LockBit ransomware has been used against a wide variety of targets, from small businesses and individuals to huge corporations.

It was used "for more than twice as many attacks as its nearest competitor in 2023", according to MalwareBytes.

The group has gained notoriety and attention from law enforcement agencies after high-profile attacks such as the one on Royal Mail.

Last November, it was blamed for an attack on the US arm of the Industrial and Commercial Bank of China (ICBC) -- one of the biggest financial institutions in the world -- as well as US aerospace giant Boeing.

In 2022, a LockBit affiliate attacked the Hospital for Sick Children in Toronto, Canada, disrupting lab and imaging results. LockBit reportedly apologised for that attack.

"Although LockBit developers have created rules stipulating that their ransomware will not be used against critical infrastructure, it is clear that LockBit affiliates largely disregard these rules," Stacey Cook, an analyst at the cybersecurity firm Dragos, wrote in a report published last year.

"LockBit developers do not appear to be overly concerned with holding their affiliates accountable."

Who is fighting back, and how?

LockBit's growing visibility and its affiliates' increasing attacks meant law enforcement agencies ramped up their efforts to win this cat-and-mouse game.

An alliance of agencies from 10 nations, led by Britain's National Crime Agency, on Tuesday said they had disrupted LockBit at "every level" in an effort codenamed "Operation Cronos".

Europol said 34 servers in Europe, Australia, the United States and Britain were taken down and 200 Lockbit-linked cryptocurrency accounts were frozen.

The NCA said the action had compromised LockBit's "entire criminal enterprise".

"This likely spells the end of LockBit as a brand. The operation has been compromised and other cybercriminals will not want to do business with them," Emsisoft's Callow told AFP.

But in recent years, cybersecurity experts have detected ransomware groups that suspended operations following law enforcement action only to re-emerge under different names.

"Our work does not stop here. LockBit may seek to rebuild their criminal enterprise," NCA Director General Graeme Biggar said in a statement.

"However, we know who they are, and how they operate. We are tenacious and we will not stop in our efforts to target this group and anyone associated with them."

W.Vogt--NZN