LONDON: An international operation led by the UK and US law enforcement agencies has severely disrupted “the world’s most harmful cybercrime group”, the Russian-linked ransomware specialist LockBit, officials announced on Tuesday.

LockBit and its affiliates have targeted governments, major companies, schools and hospitals, causing billions of dollars of damage and extracting tens of millions in ransoms from victims.

Britain’s National Crime Agency (NCA), working with the Federal Bureau of Investigation, Europol and agencies from nine other countries in Operation Cronos, said it had infiltrated LockBit’s network and taken control of its services.

“We have hacked the hackers, we have taken control of their infrastructure, seized their source code, and obtained keys that will help victims decrypt their systems,” NCA director general Graeme Biggar told reporters in London.

LockBit and its affiliates hacked govts, major firms, extracted tens of millions in ransoms from victims

LockBit’s website — selling services that allow people to organise cyberattacks and hold data until a ransom is paid appears — was taken over on Monday evening.

A message appeared on the site stating that it was “now under control of law enforcement”.

“As of today LockBit is effectively redundant, LockBit has been locked out,” Biggar said.

The US Justice Department (DOJ) said the agencies had seized control of “numerous public-facing websites used by LockBit to connect to the organisation’s infrastructure” and taken control of servers used by LockBit administrators.

The NCA added that it had obtained more than 1,000 decryption keys and will be contacting UK-based victims in the coming days and weeks to offer support and help them recover encrypted data.

Biggar said the network had been behind 25 per cent of all cyberattacks in the past year.

LockBit has targeted over 2,000 victims and received more than $120 million in ransom payments since it formed four years ago, according to the (DOJ).

Those targeted have included Britain’s Royal Mail, US aircraft manufacturer Boeing, and a Canadian children’s hospital.

In January 2023, US law enforcers shut down the Hive ransomware operation which had extorted some $100m from more than 1,500 victims worldwide.

Following that action, LockBit had been seen as the biggest current threat.

Dark Web

Hive and LockBit are part of what cybersecurity experts call a “ransomware as a service” style, or RaaS — a business that leases its software and methods to others to use in extorting money.

Ariel Ropek, director of cyber threat intelligence at cybersecurity firm Avertium, told AFP last year that this structure makes it possible for criminals with minimal computer fluency to get into ransomware by paying others for their expertise.

On the so-called dark web, providers of ransomware services pitch their products openly.

At one end are the initial access brokers, who specialise in breaking into corporate or institutional computer systems.

They then sell that access to the hacker, or ransomware operator.

But the operator depends on RaaS developers like Hive or Lockbit, which have the programming skills to create the malware needed to carry out the operation and avoid counter-security measures.

Typically, their programmes — once inserted by the ransomware operator into a target’s IT systems — are manipulated to freeze, via encryption, the target’s files and data.

RaaS developers offer a full service to the operators, for a large share of the ransom paid out, according to Ropek.

When the ransomware is planted and activated, the target receives a message telling them how much to pay to get their data unencrypted.

That ransom can run from thousands to millions of dollars, usually depending on the financial strength of the target.

On Tuesday, the US unsealed an indictment against two Russian nationals, bringing to five the number of Russians it has charged in connection with LockBit.

In May last year the US offered a $10 million reward for information leading to the arrest of one of them, Mikhail Pavlovich Matveev.

Biggar said a “large concentration” of the cybercriminals are in Russia and are Russian-speaking but law enforcement agencies have not seen any direct support for LockBit from the Russian state.

“There is clearly some tolerance of cyber criminality within Russia,” he added.

Published in Dawn, February 21st, 2024

Opinion

Editorial

Border clashes
19 May, 2024

Border clashes

THE Pakistan-Afghanistan frontier has witnessed another series of flare-ups, this time in the Kurram tribal district...
Penalising the dutiful
19 May, 2024

Penalising the dutiful

DOES the government feel no remorse in burdening honest citizens with the cost of its own ineptitude? With the ...
Students in Kyrgyzstan
Updated 19 May, 2024

Students in Kyrgyzstan

The govt ought to take a direct approach comprising convincing communication with the students and Kyrgyz authorities.
Ominous demands
Updated 18 May, 2024

Ominous demands

The federal government needs to boost its revenues to reduce future borrowing and pay back its existing debt.
Property leaks
18 May, 2024

Property leaks

THE leaked Dubai property data reported on by media organisations around the world earlier this week seems to have...
Heat warnings
18 May, 2024

Heat warnings

STARTING next week, the country must brace for brutal heatwaves. The NDMA warns of severe conditions with...