Fictitious html pages and hacker programs are shown on screens while a man has his hands on the keyboard
Share and Follow

While ransomware incidents have been occurring for more than 30 years, only in the last decade has the term in popular media. Ransomware is a type of malicious software that blocks access to computer systems or encrypts files until a ransom is paid.
Cybercriminal gangs have adopted ransomware as a get-rich-quick scheme. Now, in the era of “ransomware as a service”, this has become a prolific and highly profitable tactic.
Providing ransomware as a service means groups benefit from affiliate schemes where a commission is paid for successful ransom demands.
Although only one of the many gangs operating, LockBit has been increasingly visible, with several high-profile victims recently appearing on the group’s website.

So what is LockBit? Who has fallen victim to them? And how can we protect ourselves from them?

What, or who, is LockBit?

To make things confusing, the term LockBit refers to both the malicious software (malware) and the group that created it.

LockBit first gained attention in 2019. It’s a form of malware deliberately designed to be secretly deployed inside organisations, to find valuable data and steal it.

But rather than simply stealing the data, LockBit is a form of ransomware. Once the data has been copied, it is encrypted, rendering it inaccessible to legitimate users. This data is then held to ransom – pay up, or you’ll never see your data again.

To add further incentive for the victim, if the ransom is not paid, they are threatened with publication of the stolen data (often described as double extortion). This threat is reinforced with a countdown timer on LockBit’s blog .

Little is known about the LockBit group.

Fictitious html pages and hacker programs are shown on screens while a man has his hands on the keyboard

Cybercriminal gangs have adopted ransomware as a get-rich-quick scheme. Source: Getty / DPA

Based on their website, the group doesn’t have a specific political allegiance. Unlike some other groups, they also don’t limit the number of affiliates: “We are located in the Netherlands, completely apolitical and only interested in money. We always have an unlimited amount of affiliates, enough space for all professionals. It does not matter what country you live in, what types of language you speak, what age you are, what religion you believe in, anyone on the planet can work with us at any time of the year.”

Notably, LockBit have rules for their affiliates. Examples of forbidden targets (victims) include:

  • Critical infrastructure
  • Institutions where damage to the files could lead to death (such as hospitals)
  • Post-Soviet countries such as Armenia, Belarus, Estonia, Georgia, Kazakhstan, Kyrgyzstan, Latvia, Lithuania, Moldova, Russia, Tajikistan, Turkmenistan, Ukraine and Uzbekistan.
Other ransomware providers have also claimed they won’t target institutions like hospitals – but this doesn’t guarantee victim immunity. Earlier this year , triggering the group behind LockBit to post an apology, offer free decryption tools and allegedly expel the affiliate who hacked the hospital.

While rules may be in place, there is always potential for rogue users to target forbidden organisations.

The final rule in the list above is an interesting exception. According to the group, these countries are off limits because a high proportion of the group’s members were “born and grew up in the Soviet Union”, despite now being “located in the Netherlands”.

Who’s been hacked by LockBit?

High-profile victims include the United Kingdom’s Royal Mail and Ministry of Defence, and Japanese cycling component manufacturer Shimano. Data stolen from aerospace company Boeing was leaked just this week after the company refused to pay ransom to LockBit.

While not yet confirmed, the recent ransomware incident experienced by the Industrial and Commercial Bank of China has been claimed by LockBit.

Since appearing on the cybercrime scene, LockBit has been linked to almost .

From the list of victims seen below, LockBit is clearly being used in a scatter-gun approach, with a wide variety of victims. This is not a series of planned, targeted attacks. Instead, it shows LockBit software is being used by a diverse range of criminals in a service model.

How we can protect ourselves

In recent years, ransomware as a service (RaaS for short) has become popular.
Just as organisations use software-as-a-service providers – such as licensing for office tools like Microsoft 365, or accounting software for payroll – malicious services are providing tools for cybercriminals.

Ransomware as a service enables an inexperienced criminal to deliver a ransomware campaign to multiple targets quickly and efficiently – often at minimal cost and usually on a profit-sharing basis.

The RaaS platform handles malware management, data extraction, victim negotiation and payment handling, effectively outsourcing criminal activities.
The process is so well developed, such groups even provide guidelines on how to become an affiliate, and what benefits one will gain.
With a 20 per cent commission of the ransom being paid to LockBit, this system can generate significant revenue for the group – including the deposit of 1 Bitcoin (approximately $58,000) required from new users.
While ransomware is a growing concern around the globe, good cybersecurity practices can help. Updating and patching our systems, good password and account management, network monitoring and reacting to unusual activity can all help to minimise the likelihood of any compromise – or at least limit its extent.
For now, whether or not to pay a ransom is a matter of preference and ethics for each organisation. But if we can make it more difficult to get in, criminal groups will simply shift to easier targets.

Jennifer Medbury is a lecturer of Intelligence and Security at Edith Cowan University and Paul Haskell-Dowland is a professor of Cyber Security Practice at Edith Cowan University.

Share and Follow
Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like
The stats that prove what every Australian is thinking about epidemic of violence against women

Evidence that confirms the widespread concern among Australians regarding the ongoing issue of violence against women

Intimate partner violence is on the rise in Australia, according to new…

My daughter has become involved in a cult. I don’t know how to help her leave

Why are we still drawn to cults and cult-like groups, and should…
Police are investigating a fire investigation which destroyed several iconic palm trees along the St Kilda foreshore in Melbourne.

Palm trees that are a symbol catch fire along Melbourne’s coast

Police are investigating a fire that destroyed several iconic palm trees along…
US fails to find 'smoking gun' in Russian opposition leader's death

US Unable to Discover Definitive Evidence in the Death of Russian Opposition Leader

United States intelligence officials have determined that Russian President Vladimir Putin likely…

Police report that many officers were shot in an ongoing incident in North Carolina.

Numerous law enforcement officers have been struck by gunfire on Monday in…

After undergoing obesity surgery at 12, Lexi may now have to rely on weight-loss medication for the long term

Watch Born Big on 30 April at 9:30pm on SBS and In…

Increasing Salaries: How does your earnings stack up against others?

Wages in Australia are on the rise, with many improvements since the…
Senior royal brings letter from the King in surprise Ukraine visit

Member of royal family visits Ukraine unexpectedly with a letter from the King

Sophie, the Duchess of Edinburgh, has become the first member of the…