Arrest

Update February 20, 07:21 EST: Article updated with further details on the operation.

Law enforcement 
  • arrested two operators of the LockBit ransomware gang in Poland and Ukraine, 
  • created a decryption tool to recover encrypted files for free, and 
  • seized over 200 crypto-wallets after hacking the cybercrime gang's servers in an international crackdown operation.
French and U.S. judicial authorities also issued three international arrest warrants and five indictments targeting other LockBit threat actors.

Sungatov and Kondratiev were also sanctioned today by the U.S. Department of Treasury's Office of Foreign Assets Control.

Operation Cronos

The global LockBit crackdown was coordinated by Operation Cronos, a task force headed by the U.K. National Crime Agency (NCA) and coordinated in Europe by Europol and Eurojust. The investigation began in April 2022 at Eurojust, following a request from the French authorities.

Operation Cronos will provide decryptors for LockBit victims

"The months-long operation has resulted in the compromise of LockBit's primary platform and other critical infrastructure that enabled their criminal enterprise," Europol said today.

"This includes the takedown of 34 servers in the Netherlands, Germany, Finland, France, Switzerland, Australia, the United States and the United Kingdom.

"This infrastructure is now under law enforcement control, and more than 14 000 rogue accounts responsible for exfiltration or infrastructure have been identified and referred for removal by law enforcement."

Europol has told BleepingComputer that those rogue accounts were used by LockBit members to host tools and software used in attacks and to store data stolen from companies.

As part of Operation Cronos, law enforcement also retrieved over 1,000 decryption keys from the seized LockBit servers. 
  • Using these decryption keys, the Japanese Police, the NCA, and the Federal Bureau of Investigation (FBI) developed a LockBit 3.0 Black Ransomware decryption tool with Europol's support.
This free decryptor is now available via the 'No More Ransom' portal. BleepingComputer contacted Europol to learn if the decryptor only helps LockBit victims after a certain date, but a response was not immediately available.
Details of Operation Cronos to lock out Lockbit reveled | Science News -  News9live
At this time, it is unknown how much cryptocurrency was stored in the 200 seized wallets. 
Europol says that they have gathered a "vast amount" of data about the LockBit operation, which will be used in ongoing operations targeting the leaders of the group, as well as its developers and affiliates.

LockBit infrastructure seized

As part of this joint action, the NCA has taken control of LockBit servers used to host data stolen from victims' networks in double extortion attacks and the gang's dark web leak sites.

LockBit's dark websites were taken down yesterday, showing seizure banners that revealed the disruption resulted from an ongoing international law enforcement action.

LockBit ransomware seizure banner
LockBit ransomware seizure banner (BleepingComputer)
The ransomware group's affiliate panel has also been seized by the police, now showing a message to affiliates after they log in that their information, LockBit source code, chats, and victim information were also seized.

"We have source code, details of the victims you have attacked, the amount of money extorted, the data stolen, chats, and much, much more," the message reads.

"We may be in touch with you very soon. Have a nice day. Regards, The National Crime Agency of the U.K., the FBI, Europol, and the Operation Cronos Law Enforcement Task Force."

LockBit leak site after seizure
LockBit leak site after seizure (BleepingComputer)

Who is LockBit?

The LockBit ransomware-as-a-service (RaaS) operation surfaced in September 2019 and has since been linked to or has claimed attacks on many high-profile organizations worldwide, including Boeing, the UK Royal Mail, the Continental automotive giant, and the Italian Internal Revenue Service.

In a joint advisory released in June, U.S. cybersecurity authorities and partners worldwide estimated that LockBit had extorted at least $91 million from U.S. organizations after as many as 1,700 attacks since 2020.Today, the U.S. Department of Justice said the gang had over 2,000 victims and collected more than $120 million in ransom payments after demands totaling hundreds of millions of dollars.
  • Most recently, Bank of America warned customers of a data breach after third-party service provider Infosys McCamish Systems (IMS) was hacked in an attack claimed by LockBit.
In recent years, international law enforcement operations have also led to the seizure of servers and dark websites used by ALPHV (BlackCat) and Hive ransomware.

Related Articles:

LockBit ransomware disrupted by global police operation

LockBit claims ransomware attack on Fulton County, Georgia

Bank of America warns customers of data breach after vendor hack

The Week in Ransomware - February 2nd 2024 - No honor among thieves

Interpol operation Synergia takes down 1,300 servers used for cybercrime