By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
digital news today : Latest News digital news today : Latest News
Notification Show More
Latest News
Apple a obtenu un brevet pour un nouveau système de caméra pour l’Apple Watch
It-Connect
Flash Party APK Download Latest Version for Android
apk
JioCinema: TATA IPL & more (Android TV) 4.0.8 APK Download by Tata IPL on all networks. Tata IPL हर नेटवर्क पर
app
iSkysoft Data Recovery 10.0 Crack + Serial Key Download
nulled
احترف نماذج جوجل – Books And Courses
nulled
Aa
  • Marketing
    • Crypto
    • news nft tech frensh
    • Technology
  • ahref
    • android
    • blogdumoderateur
    • creativetrends
    • Crypto
    • css tricks daily
  • Daily sécurité
    • dailydev
  • digitaltrends
    • Featured
    • Food
    • for blogger
    • google
    • gpldload
  • Technology
    • It-Connect
      • Laravel tricks
      • Marketing
      • news nft tech frensh
      • nft
      • thehackernews
      • web3
        • webrankinfo
Reading: Inside the Cyberthreat That’s Costing Millions
Share
digital news today : Latest News digital news today : Latest News
Aa
  • Marketing
  • ahref
  • Daily sécurité
  • digitaltrends
  • Technology
Search
  • Marketing
    • Crypto
    • news nft tech frensh
    • Technology
  • ahref
    • android
    • blogdumoderateur
    • creativetrends
    • Crypto
    • css tricks daily
  • Daily sécurité
    • dailydev
  • digitaltrends
    • Featured
    • Food
    • for blogger
    • google
    • gpldload
  • Technology
    • It-Connect
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
digital news today : Latest News > thehackernews > Inside the Cyberthreat That’s Costing Millions
thehackernews

Inside the Cyberthreat That’s Costing Millions

Mike
Last updated: 2023/03/18 at 6:18
Mike
Share
SHARE


lockbit-ransomware

U.S. government agencies have released a joint cybersecurity advisory detailing the indicators of compromise (IoCs) and tactics, techniques, and procedures (TTPs) associated with the notorious LockBit 3.0 ransomware.

« The LockBit 3.0 ransomware operations function as a Ransomware-as-a-Service (RaaS) model and is a continuation of previous versions of the ransomware, LockBit 2.0, and LockBit, » the authorities said.

The alert comes courtesy of the U.S. Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing & Analysis Center (MS-ISAC).

Since emerging in late 2019, the LockBit actors have invested significant technical efforts to develop and fine-tune its malware, issuing two major updates — LockBit 2.0, released in mid-2021, and LockBit 3.0, released in June 2022. The two versions are also known as LockBit Red and LockBit Black, respectively.

« LockBit 3.0 accepts additional arguments for specific operations in lateral movement and rebooting into Safe Mode, » according to the alert. « If a LockBit affiliate does not have access to passwordless LockBit 3.0 ransomware, then a password argument is mandatory during the execution of the ransomware. »

The ransomware is also designed to infect only those machines whose language settings do not overlap with those specified in an exclusion list, which includes Romanian (Moldova), Arabic (Syria), and Tatar (Russia).

Initial access to victim networks is obtained via remote desktop protocol (RDP) exploitation, drive-by compromise, phishing campaigns, abuse of valid accounts, and weaponizing of public-facing applications.

Upon finding a successful ingress point, the malware takes steps to establish persistence, escalate privileges, carry out lateral movement, and purge log files, files in the Windows Recycle Bin folder, and shadow copies, before initiating the encryption routine.

« LockBit affiliates have been observed using various freeware and open source tools during their intrusions, » the agencies said. « These tools are used for a range of activities such as network reconnaissance, remote access and tunneling, credential dumping, and file exfiltration. »

One defining characteristic of the attacks is the use of a custom exfiltration tool referred to as StealBit, which the LockBit group provides to affiliates for double extortion purposes.

The ransomware gang, notably, suffered a huge blow in late September 2022 when a disgruntled LockBit developer released the builder code for LockBit 3.0, raising concerns that other criminal actors could take advantage of the situation and spawn their own variants.

In November, the U.S. Department of Justice reported that the LockBit ransomware strain has been used against at least 1,000 victims worldwide, netting the operation over $100 million in illicit profits.

Industrial cybersecurity firm Dragos, earlier this year, revealed that LockBit 3.0 was responsible for 21% of 189 ransomware attacks detected against critical infrastructure in Q4 2022, accounting for 40 incidents. A majority of those attacks impacted food and beverage and manufacturing sectors.

The FBI’s Internet Crime Complaint Center (IC3), in its latest Internet Crime Report, listed LockBit (149), BlackCat (114), and Hive (87) as the top three ransomware variants victimizing critical infrastructure in 2022.

WEBINAR

Discover the Hidden Dangers of Third-Party SaaS Apps

Are you aware of the risks associated with third-party app access to your company’s SaaS apps? Join our webinar to learn about the types of permissions being granted and how to minimize risk.

RESERVE YOUR SEAT

The advisory comes as the BianLian ransomware group has shifted its focus from encrypting its victims’ files to pure data-theft extortion attacks, months after cybersecurity company Avast released a free decryptor in January 2023.

In a related development, Kaspersky has published a free decryptor to help victims who have had their data locked down by a version of ransomware based on the Conti source code that leaked after Russia’s invasion of Ukraine last year led to internal friction among the core members.

« Given the sophistication of the LockBit 3.0 and Conti ransomware variants, it is easy to forget that people are running these criminal enterprises, » Intel 471 noted last year. « And, as with legitimate organizations, it only takes one malcontent to unravel or disrupt a complex operation. »

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





source:thehackernews.com

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Mike mars 18, 2023
Share this Article
Facebook Twitter Copy Link Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Agiles Arbeiten mit Jira leicht gemacht
Next Article Alternance – Spécialiste Sécurité et Sûreté F/H
lapressecrypto.com
lapressecrypto.com
Follow US

© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.

Removed from reading list

Undo
Go to mobile version
Welcome Back!

Sign in to your account

Register Lost your password?