When LockBit 3.0 Ransomware Takes a Twist
- The unintentional release of the LockBit 3.0 ransomware builder has resulted in its gross misuse by cyber villains who are developing new variants.
- Russian cybersecurity firm Kaspersky has unearthed an instance of ransomware that used a variant of LockBit but had an incredibly unique ransom request method.
Unveiling the Unusual LockBit 3.0 Ransomware Misuse
Last year, the unpleasant surprise of the LockBit 3.0 ransomware builder leaking quickly turned into a full-blown nightmare as cyber-hackers started exploiting the tool to create new anomalies. This is akin to someone dropping a bunch of tools in the middle of a field, and then coming back to find a fully constructed, albeit evil, robot in their place. Yes, robots can be built in fields, apparently!
A Ransomware Mutation Caught by Kaspersky
The Russian cybersecurity heavyweight, Kaspersky, detected a ransomware breach that implemented a version of LockBit, but with a ransom demand process that would turn heads. It’s like enjoying a predictable movie but suddenly, the plot twist leaves you sitting on the edge of your seat.
This ransom note wasn’t your everyday, run-of-the-mill “hand over the cash” type of demand. Instead, it took a curious turn. The hacker behind this incident decided to switch up the ransom note with a headline related to a… Well, that’s a story for the next report.
While the leak of the LockBit 3.0 ransomware builder last year was already a worrying incident, the real horror commenced when malicious actors started abusing the tool to generate new mutations. With bigwig cybersecurity company Kaspersky catching wind of a unique ransom request method, we’re left to wonder: how much farther will these cyber-villains push the bar? It’s like a bad tech sequel – just when you thought it couldn’t get any weirder, it does.