Arabic Arabic Chinese (Simplified) Chinese (Simplified) Dutch Dutch English English French French German German Italian Italian Portuguese Portuguese Russian Russian Spanish Spanish
| (844) 627-8267

LockBit Ransomware Group’s Big Liability: ‘Ego-Driven CEO’ | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware


Ransomware Researcher Jon DiMaggio Probes LockBit’s Business Operation and Behavior

Jon DiMaggio, chief security strategist, Analyst1

The notorious LockBit 3.0 ransomware group runs just like a business, with a relentless focus on recruiting top talent and maintaining an advanced product – which has led to the group’s longevity, says ransomware-tracking researcher Jon DiMaggio.

See Also: Live Webinar | Navigating the Difficulties of Patching OT


But that doesn’t mean everything runs smoothly in LockBit land. Take the ex-BlackMatter developer it recruited who quit LockBit and leaked its source code after the organization docked his pay by $50,000 to recoup a bug bounty award after a programmer spotted an error in his code. In response, the group branded him as being “a deranged psycho,” as DiMaggio documents in a new report analyzing LockBit’s behavior.


A major takeaway and a way to potentially disrupt LockBit: It’s “a business that is run by an ego-driven CEO that has massive insecurities,” says DiMaggio, chief security strategist at threat intelligence firm Analyst1. So, “while unfortunately they have a great criminal product … what will eventually lead to their demise is that sort of ego and the constant over-reacting because of their insecurities to things that happen, such as the developer leaking their code.”


In this video interview with Information Security Media Group, DiMaggio details:


  • Direct connections between the leadership of LockBit and sometime rivals such as DarkMatter and REvil;

  • Why the LockBitSupp persona appears to be operated by at least two individuals, including the group’s leader;

  • The inside story of the developer who leaked LockBit’s code and may be in hiding – and why he should be a top target for law enforcement recruitment.

DiMaggio has over 15 years of experience hunting, researching and documenting advanced cyberthreats. As a specialist in enterprise ransomware attacks and nation-state intrusions, he has exposed the criminal cartels behind major ransomware attacks, aided law enforcement agencies in federal indictments of nation-state attacks and shared his work at conferences such as RSA and Black Hat. In 2022, he authored “The Art of Cyberwarfare: An Investigator’s Guide to Espionage, Ransomware and Organized Cybercrime,” which was awarded the SANS Difference Makers Award for cybersecurity book of the year.



——————————————————–


Click Here For The Original Source.

National Cyber Security

FREE
VIEW