
A coordinated international law enforcement operation recently targeted the LockBit ransomware gang, leading to the seizure of its website, infrastructure, and data. Despite this significant takedown, the cybercrime group has announced its comeback, blaming outdated software for their initial vulnerability and secretly building a new version of its file encryptor, dubbed LockBit-NG-Dev. They have reportedly restored their servers just 2 days after the server takedown and are calling for increased attacks on the government sector. This resurgence highlights the persistent challenge of combating cybercrime, as even successful takedowns do not address the root issues exploited by digital extortionists. The operation involved the UK National Crime Agency (NCA) and an international coalition, striking a blow against the Russian-based, one of the most prolific ransomware groups. However, experts, including Ed Williams from Trustwave, caution that such actions do not fix the underlying problems of ransomware and digital extortion.
LockBit is back extorting victims on the dark web a week after a major international law enforcement taskforce knocked the prolific #ransomware gang’s operations offline. #cybersecurity #infosec #ITsecurity https://t.co/FZvYAFSqse
Russian-based LockBit ransomware hackers attempt a comeback https://t.co/msIoXkiuaE
Lockbit cybercrime gang claims restoration of operations following global police crackdown https://t.co/YS4iB3E1vr https://t.co/wAlYOfgISv


















