Categories: Technology

UK law enforcement appears to take over hacker group website

LONDON (AFP): A website selling services that allow people to organise cyber attacks and hold data until a ransom is paid appears to have been taken over by UK law enforcement.

A message appeared on the site of ransomware specialist LockBit on Monday evening stating that it was “now under control of law enforcement”.

“This site is now under the control of The National Crime Agency of the UK, working in close cooperation with the FBI and the international law enforcement task force, ‘Operation Cronos’,” it reads.

In January 2023, US law enforcers shut down the Hive ransomware operation which had extorted some $100 million from more than 1,500 victims worldwide.

Following the action taken against Hive, Lockbit has been seen as the biggest current threat.

It attacked Britain’s Royal Mail in early January 2023, and a Canadian children’s hospital in December of the same year.

In November 2023, the US Justice Department said LockBit had reaped tens of millions of dollars in ransoms from 1,000 victims.

Hive and Lockbit are part of what cybersecurity experts call a “ransomware as a service” style, or RaaS — a business that leases its software and methods to others to use in extorting money.

Ariel Ropek, director of cyber threat intelligence at cybersecurity firm Avertium, told AFP last year this structure makes it possible for criminals with minimal computer fluency to get into the ransomware game by paying others for their expertise.

On the so-called dark web, providers of ransomware services and support pitch their products openly.

At one end are the initial access brokers, who specialise in breaking into corporate or institutional computer systems.

They then sell that access to the hacker, or ransomware operator.

But the operator depends on RaaS developers like Hive or Lockbit, which have the programming skills to create the malware needed to carry out the operation and avoid counter-security measures.

Typically, their programmes — once inserted by the ransomware operator into the target’s IT systems — are manipulated to freeze, via encryption, the target’s files and data.

RaaS developers offer a full service to the operators, for a large share of the ransom paid out, according to Ropek.

When the ransomware is planted and activated, the target receives a message telling them how much to pay to get their data unencrypted.

That ransom can run from thousands to millions of dollars, usually depending on the financial strength of the target.

The Frontier Post

Recent Posts

Israel’s Gantz demands Gaza day-after plan by June 8, threatens to quit cabinet

JERUSALEM (Reuters): Israeli war cabinet minister Benny Gantz demanded on Saturday that Prime Minister Benjamin…

12 hours ago

Vietnam nominates public security minister to be new president

HANOI: Vietnam’s governing Communist Party has nominated the public security minister to be the next…

12 hours ago

In Canada, bodies go unclaimed as costs put funerals out of reach

TORONTO (Reuters): Some Canadian provinces have logged a jump in unclaimed dead bodies in recent…

12 hours ago

Nancy Pelosi’s husband’s attacker jailed for 30 years

SAN FRANCISCO (AFP): A man who attacked the elderly husband of former US House Speaker…

12 hours ago

Dar, Muqam to depart for Kyrgyzstan amid mob attacks

F.P. Report ISLAMABAD: Prime Minister Shehbaz Sharif on Saturday decided to send Deputy Prime Minister…

12 hours ago

Nawaz questions his disqualification

F.P. Report LAHORE: Pakistan Muslim League-Nawaz supremo Mian Nawaz Sharif reiterated his long held position…

12 hours ago

This website uses cookies.