Last year, the unpleasant surprise of the LockBit 3.0 ransomware builder leaking quickly turned into a full-blown nightmare as cyber-hackers started exploiting the tool to create new anomalies. This is akin to someone dropping a bunch of tools in the middle of a field, and then coming back to find a fully constructed, albeit evil, robot in their place. Yes, robots can be built in fields, apparently!
The Russian cybersecurity heavyweight, Kaspersky, detected a ransomware breach that implemented a version of LockBit, but with a ransom demand process that would turn heads. It’s like enjoying a predictable movie but suddenly, the plot twist leaves you sitting on the edge of your seat.
This ransom note wasn’t your everyday, run-of-the-mill “hand over the cash” type of demand. Instead, it took a curious turn. The hacker behind this incident decided to switch up the ransom note with a headline related to a… Well, that’s a story for the next report.
While the leak of the LockBit 3.0 ransomware builder last year was already a worrying incident, the real horror commenced when malicious actors started abusing the tool to generate new mutations. With bigwig cybersecurity company Kaspersky catching wind of a unique ransom request method, we’re left to wonder: how much farther will these cyber-villains push the bar? It’s like a bad tech sequel – just when you thought it couldn’t get any weirder, it does.
Original Article: https://thehackernews.com/2023/08/lockbit-30-ransomware-builder-leak.html
No products in the cart.