Info@NationalCyberSecurity
Info@NationalCyberSecurity

Hacker group’s site taken over by law enforcement | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker


Getty Images A sinister image of a person's hands on a keyboard, with a tablet running some sort of codeGetty Images

An online site run by a major criminal gang who organise ransomware cyber attacks appears to have been taken over by law enforcement.

The site belongs to the group LockBit.

It sells services which allow people to compromise computer networks and hold their data until a ransom is paid.

On Monday evening, a message appeared on the site belonging to the group saying it is “now under control of law enforcement”.

The message says that the “site is under the control of the National Crime Agency of the UK, working in close cooperation with the FBI and the international law enforcement task force, ‘Operation Cronos’.”

It adds that this is an “ongoing and developing operation” and adds: “Return here for more information at 11:30 GMT on Tuesday, February 20th”.

An image of the screen of LockBit's website, that reads "The site is now under control of law enforcement" alongside images of flags of various countries that participated in the operation
The message that appears on LockBit’s website after it was taken over by law enforcement agencies

The operation was conducted by Britain’s National Crime Agency, the US Federal Bureau of Investigation, Europol and a coalition of international police agencies, according to the post on LockBit’s website.

The UK’s National Cyber Security Centre (NCSC) has previously issued a warning about the “enduring threat” posed by the group, alongside partner agencies in the US, Australia, Canada, France, Germany and New Zealand.

The statement from last year adds that LockBit’s eponymous software was the “most deployed ransomware variant” across the world in 2022, and that it “continues to be prolific so far in 2023”.

LockBit has been involved in many high profile hackings, including the UK’s Royal Mail in early 2023. The group and its affiliates make money by stealing sensitive data and threatening to leak it unless their victims pay a ransom.

LockBit was first discovered in 2020, according to Reuters, when the software surfaced on Russian language forums, leading some analysts to believe the group is based in Russia.

Watch: What is ransomware and how does it work?



——————————————————–


Click Here For The Original Story From This Source.

.........................

National Cyber Security

FREE
VIEW