"Global Authorities Dismantle LockBit Ransomware Group and Prevent Next-Gen Threat"

TL;DR Summary
LockBit ransomware developers were secretly working on a new version of their file encrypting malware, LockBit-NG-Dev, likely to become LockBit 4.0, before law enforcement took down their infrastructure. The new version, written in .NET and compiled with CoreRT, supports multiple operating systems and includes features such as three encryption modes, custom file exclusion, and a self-delete mechanism. While the new encryptor lacks some features present in previous iterations, its discovery is another blow to LockBit operators through Operation Cronos, making restoring their cybercriminal business a tough challenge.
- LockBit ransomware secretly building next-gen encryptor before takedown BleepingComputer
- Ransomware associated with LockBit still spreading 2 days after server takedown Ars Technica
- International investigation disrupts the world's most harmful cyber crime group National Crime Agency
- LockBit ransomware group disrupted by FBI, NCA, Europol operation The Washington Post
- Authorities dismantled LockBit before it could unleash revamped variant The Register
Reading Insights
Total Reads
0
Unique Readers
1
Time Saved
1 min
vs 2 min read
Condensed
70%
287 → 87 words
Want the full story? Read the original article
Read on BleepingComputer