article thumbnail

Operation Cronos: law enforcement disrupted the LockBit operation

Security Affairs

An international law enforcement operation codenamed ‘Operation Cronos’ led to the disruption of the LockBit ransomware operation. A joint law enforcement action, code-named Operation Cronos, conducted by law enforcement agencies from 11 countries has disrupted the LockBit ransomware operation. on January 5, 2020.

article thumbnail

US GOV OFFERS A REWARD OF UP TO $15M FOR INFO ON LOCKBIT GANG MEMBERS AND AFFILIATES

Security Affairs

government offers rewards of up to $15 million for information that could lead to the identification or location of LockBit ransomware gang members and affiliates. According to the press release published by the Department of State , the Lockbit ransomware operators carried out over 2,000 attacks against victims worldwide since January 2020.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

More details about Operation Cronos that disrupted Lockbit operation

Security Affairs

Law enforcement provided additional details about the international Operation Cronos that led to the disruption of the Lockbit ransomware operation. Yesterday, a joint law enforcement action, code-named Operation Cronos , conducted by law enforcement agencies from 11 countries disrupted the LockBit ransomware operation.

article thumbnail

News alert: Beazley reports on how AI, new tech distract businesses as cyber risk intensifies

The Last Watchdog

The data shows how perceptions around cyber and technology risks, from ransomware and other cyber-attacks to the threats posed by AI, are changing the global business risk landscape. The economic impact of cybercrime on business across the globe continues to reach new levels, with the cost predicted to reach US$10.5

Risk 189
article thumbnail

The Week in Cyber Security and Data Privacy: 12 – 18 February 2024

IT Governance

ALPHV/BlackCat ransomware gang adds 2.7 TB of ASA Electronics data to its leak site The ALPHV/BlackCat ransomware gang is attempting to extort a ransom from ASA Electronics for 2.7 It is not known how long the database was publicly available, nor whether anyone else accessed it. Date breached: 384,658,212 records. Data breached: 2.7

article thumbnail

Leaked documents from Russian firm NTC Vulkan show Sandworm cyberwarfare arsenal

Security Affairs

The group is also the author of the NotPetya ransomware that hit hundreds of companies worldwide in June 2017. Energy utilities and oil and gas, but also water utilities and transportation systems, are privileged targets of nation-state actors. ” concludes the report.

article thumbnail

The Week in Cyber Security and Data Privacy: 5 – 11 February 2024

IT Governance

GB Impact Energy Services Source New Engineering Canada Yes 52,707 Lancaster County Sheriff’s Office Source New Public USA Yes 52,567 Maximum Research Source New Professional services USA Yes 52 GB Terago Source New Telecoms Canada Yes 45 GB Zivilgeometer Source New Engineering Austria Yes 41.83 GB Signature Performance, Inc.