By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Ransomware: What the LockBit 3.0 data leak reveals | Computer Weekly
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Ransomware: What the LockBit 3.0 data leak reveals | Computer Weekly
News

Ransomware: What the LockBit 3.0 data leak reveals | Computer Weekly

News Room
Last updated: 2025/05/10 at 1:59 AM
News Room Published 10 May 2025
Share
SHARE

On 7 May 2024, the presumed identity of the operator of the LockBit 3.0 franchise, also known as LockBitSupp, was revealed during UK National Crime Agency and its partners’ Operation Cronos: Dmitry Yuryevich Khoroshev.

One year later, to the day, the entire contents of the SQL database of a web administration interface for the company’s affiliates was made public. And not just anywhere – on the ransomware franchise’s websites. The irony is – they were hacked. The data was extracted on 29 April. It concerns a system that was set up on 18 December last year.

A rare light

This data provides unprecedented visibility into the activities of the LockBit 3.0 ransomware. The compilation dates of the encryption malware make it possible to adjust previous estimates of attack occurrence dates. In the case of certain known victims, they have already revealed a gap of up to 10 days between the end of the exfiltration of the victim’s data and the launch of the encryption. This underlines the importance of efforts to detect such exfiltration.

This data can also be used to attribute different victims to their attackers. This grouping will be useful for analysing negotiation methods and tracking any ransom payments.

Activity of LockBit affiliates between 18 December 2024 and 29 April 2025 – LeMagIT

This administration interface for affiliates contained 75 user accounts, two of which were most likely used by LockBitSupp itself. No less than 35 accounts were “paused,” two of which had been used against victims in Russia. The company’s operator has assured that this is the reason for their suspension.

But only 44 accounts were actually used to generate ransomware and possibly launch cyber attacks. Of these, 30 were active on 29 April, but only seven appear to have been engaged in conducting attacks at that time.

LeMagIT

Cumulative activity by month, segmented by world region.

A geographical spread

Research into the geographical origins of the victims mentioned reveals an unusual trend – in all likelihood, the Asia-Pacific region was the focus for 35.5% of the efforts of LockBit’s affiliates over the period in question, compared with 22% for Europe, and less than 11% for North America, behind Latin America at 12%.

LeMagIT

Global geographical distribution of the activities of LockBit 3.0 affiliates from the end of 2024 to the end of April 2025.

But there are very marked disparities between affiliates. PiotrBond, for example, concentrated on the Asia-Pacific region, with 76% of its victims. The same applies to Umarbishop47 (81%). DarraghBerg bet equally (33.3%) on this region and Africa-Middle East. But JamesCraig also gave priority to Asia-Pacific (42%).

This geographical review also highlights the lack of observability of the threat in this region, particularly in China, which accounted for 51 victims in the sample studied. Indonesia comes a close second with 49 victims, followed by India (35).

LeMagIT

Geographical breakdown of the activities of LockBit’s various affiliates between 18 December 2024 and 29 April 2025.

The data also suggests that South Korea is globally under-represented in observable malicious activity.

This unusual geographical distribution may reflect changes in the profiles recruited by LockBit 3.0. The most active affiliates do not seem to be those who go after the most attractive victims.

The reflection of a tarnished image

The available data suggests instead that those who multiply their victims try to target potentially less mature people than others, even if they have to pay modest sums, in countries with per-capita incomes around the world average.

The negotiations observed support this analysis, with ransom amounts very frequently requested of less than $20,000.

All in all, the LockBit 3.0 banner currently appears to have only two or three active high-flying affiliates. This is only half a surprise – the Cronos international judicial operation dented the image of the mafia-like franchise. If it manages to attract anyone, its appeal is, unsurprisingly, limited.

It even makes you wonder whether some victims who refuse to pay the ransom are deliberately not being claimed on LockBit’s showcase site so as not to tarnish its image even further.

And this new leak is unlikely to improve matters – it has exposed the Tox encrypted email IDs of certain affiliates, their passwords (stored in clear text), and pseudonyms with which certain open source intelligence specialists will no doubt be happy to investigate – not to mention the victims’ private encryption keys.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article What to Watch on Netflix This Week (May 9-16)
Next Article Here are the 2 French regions that are at risk this weekend
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Fast Charge: Google’s leaked Android redesign looks great, but it won’t matter for millions
Gadget
You Can Now Use LegoGPT to Turn Your Text Inputs Into Lego Designs
News
Paul McCartney and Dua Lipa among artists urging Starmer to rethink AI copyright plans
News
The Nigerian startup helping tailors ditch ‘paper and pen’ operations
Computing

You Might also Like

News

You Can Now Use LegoGPT to Turn Your Text Inputs Into Lego Designs

1 Min Read
News

Paul McCartney and Dua Lipa among artists urging Starmer to rethink AI copyright plans

6 Min Read
News

Sony’s Next Flagship Android Phone Lands Next Week, But Will You Be Able to Buy It?

4 Min Read
News

The 50-inch 4-Series Fire TV just hit its lowest price ever by a landslide

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?