Thursday, December 26, 2024

LockBit ransomware hits European firms & French Ministry of Justice

The LockBit ransomware operators claim to have hit business in the United Kingdom, France, Spain, Italy and Germany.

The infamous LockBit ransomware gang is claiming to have hit the Ministry of Justice of France (justice.fr) as part of its recent spree of ransomware attacks. Although the details of the attack are limited, according to the group’s official website the Ministry has 13 days to meet its demands or sensitive data of it will be published on February 10th, 2022.

LockBit ransomware gangs hits Europe

As posted on hackread, the ransomware attack was not limited to the French Ministry of Justice. In fact, the group is claiming responsibility for hitting several top companies and businesses in several European countries including Spain, Italy, France, Germany, and United Kingdom.

The full list of recent alleged victims of the LockBit ransomware gang are:

  1. Izo Group, Spain (Izo.es)
  2. ESTPM, France (Estpm.fr)
  3. City of Saint Cloud, France (Saintcloud.fr)
  4. Joda, Germany (Joda.de)
  5. Heubeck AG, Germany (Heubeck.de)
  6. Isnardi, Italy (Isnardi.it)
  7. La Ponte Marmi Srl, Italy (laponte.it)
  8. AMBAU Personalservice, Germany (Ambau-team.de)
  9. Girlguiding Charity, United Kingdom (Girlguidinglaser.org.uk).

Screenshots from the LockBit ransomware gang’s official website on the dark web shows their current and most recent victims.

About LockBit ransomware gang

Like other ransomware gangs, LockBit’s modus operandi involves blocking victims’ access to computer systems in exchange for a ransom payment. LockBit, which itself is malicious software, automatically vets for valuable targets, spreads the infection and encrypts all accessible computer systems on a network.

LockBit offers a ransomware-as-a-service (RaaS) model, facilitating fellow cybercriminals or affiliates to launch ransomware attacks through its platform. The payments are usually divided between the malware developers and the entity hiring them for the attack.

Recommended:  Chinese bots flood Twitter in a bid to try and obscure Covid protests

The Lockbit ransomware gang emerged on the threat spectrum back in September 2019 and made waves in June 2021 after launching LockBit 2.0 and recruiting new partners. The gang claims to offers the “fastest data exfiltration on the market through StealBit,” noted Emsisoft in the gang’s profile.

StealBit is a data stealer that can download 100 GB of data from an infected system within 20 minutes. Some of the gang’s previous victims include Bangkok Airways, Accenture, and hundreds of other top-notch businesses across the globe.

As for the ongoing ransomware attack, at the time of writing, none of the aforementioned companies released any statement to address the issue. However, this article will be updated based on their confirmation or denial.

RELATED: LockBit Ransomware, FBI Issues Flash Alert

source

You may also enjoy reading, The largest DDoS to date, Microsoft mitigates a 3.47 Tbps DDoS attack

Got to Cybersecurity News

Go to Homepage

Go to Cybersecurity Academy

Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for RiSec Weekly Cybersecurity Newsletter Today

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmarkClose
Recommended:  Malicious Telegram Installer Drops Purple Fox Rootkit
Share the word, let's increase Cybersecurity Awareness as we know it
- Sponsored -

Sponsored Offer

Unleash the Power of the Cloud: Grab $200 Credit for 60 Days on DigitalOcean!

Digital ocean free 200

Discover more infosec

Steven Black (n0tst3)
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK. I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated... I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK. I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!

more infosec reads

Subscribe for weekly updates

explore

more

security