• Tech News
    • Games
    • Pc & Laptop
    • Mobile Tech
    • Ar & Vr
    • Security
  • Startup
    • Fintech
  • Reviews
  • How To
What's Hot

Elementor #32036

January 24, 2025

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

April 18, 2024

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

April 16, 2024
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
    1. Games
    2. Pc & Laptop
    3. Mobile Tech
    4. Ar & Vr
    5. Security
    6. View All

    Bring Elden Ring to the table with the upcoming board game adaptation

    September 19, 2022

    ONI: Road to be the Mightiest Oni reveals its opening movie

    September 19, 2022

    GTA 6 images and footage allegedly leak

    September 19, 2022

    Wild west adventure Card Cowboy turns cards into weird and silly stories

    September 18, 2022

    7 Reasons Why You Should Study PHP Programming Language

    October 19, 2022

    Logitech MX Master 3S and MX Keys Combo for Business Gen 2 Review

    October 9, 2022

    Lenovo ThinkPad X1 Carbon Gen10 Review

    September 18, 2022

    Lenovo IdeaPad 5i Chromebook, 16-inch+120Hz

    September 3, 2022

    It’s 2023 and Spotify Still Can’t Say When AirPlay 2 Support Will Arrive

    April 4, 2023

    YouTube adds very convenient iPhone homescreen widgets

    October 15, 2022

    Google finishes iOS 16 Lock Screen widgets rollout w/ Maps

    October 14, 2022

    Is Apple actually turning iMessage into AIM or is this sketchy redesign rumor for laughs?

    October 14, 2022

    MeetKai launches AI-powered metaverse, starting with a billboard in Times Square

    August 10, 2022

    The DeanBeat: RP1 simulates putting 4,000 people together in a single metaverse plaza

    August 10, 2022

    Improving the customer experience with virtual and augmented reality

    August 10, 2022

    Why the metaverse won’t fall to Clubhouse’s fate

    August 10, 2022

    How Apple privacy changes have forced social media marketing to evolve

    October 16, 2022

    Microsoft Patch Tuesday October Fixed 85 Vulnerabilities – Latest Hacking News

    October 16, 2022

    Decentralization and KYC compliance: Critical concepts in sovereign policy

    October 15, 2022

    What Thoma Bravo’s latest acquisition reveals about identity management

    October 14, 2022

    What is a Service Robot? The vision of an intelligent service application is possible.

    November 7, 2022

    Tom Brady just chucked another Microsoft Surface tablet

    September 18, 2022

    The best AIO coolers for your PC in 2022

    September 18, 2022

    YC’s Michael Seibel clarifies some misconceptions about the accelerator • DailyTech

    September 18, 2022
  • Startup
    • Fintech
  • Reviews
  • How To
Behind The ScreenBehind The Screen
Home»Tech News»LockBit 3.0 cements dominance of ransomware ecosystem
Tech News

LockBit 3.0 cements dominance of ransomware ecosystem

August 27, 2022No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
LockBit 3.0 cements dominance of ransomware ecosystem
Share
Facebook Twitter LinkedIn Pinterest Email

The recently updated LockBit 3.0 ransomware seems to have driven a substantial uptick in documented ransomware attacks in July, with incidents rising by 47% on a month-by-month basis, according to the latest monthly threat data produced by NCC Group.

The operators of LockBit issued version 3.0 at the end of June under the tagline “Make Ransomware Great Again”. Among its new features are additional means of monetisation, with payments now accepted in more cryptocurrencies than before, post-payment data recovery and even destruction. Most notably, the group now runs a bug bounty programme, and seems particularly keen to hear about any bugs in its code that could enable outsiders to obtain its decryption tool.

In the weeks since its launch, LockBit has become by some margin the dominant ransomware strain seen in the wild, accounting for 52 of the 198 victims NCC documented in July, or 26% of the total. Two other groups – both of them associated with former Conti-linked affiliates – were also highly active in July: Hiveleaks, which hit 27 organisations; and BlackBasta, which hit 24.

“This month’s Threat Pulse has revealed some major changes within the ransomware threat scene compared to June, as ransomware attacks are once again on the up,” said NCC global head of threat intelligence Matt Hull.

“Since Conti disbanded, we have seen two new threat actors associated with the group – Hiveleaks and BlackBasta – take top position behind LockBit 3.0. It is likely we will only see the number of ransomware attacks from these two groups continue to increase over the next couple of months.”

See also  Lockbit 3.0 and the ransomware enterprise mannequin

Elsewhere, North Korea-linked advanced persistent threat (APT) group Lazarus continued a campaign of cyber extortion following a $100m crypto heist on the Harmony Horizon Bridge in late June, and earlier attacks, including a larger $600m hit on Axie Infinity.

Hull noted the increased activity by Lazarus was likely a result of the continued shrinking of North Korea’s ramshackle economy, forcing the isolated regime to lean more heavily on crime to obtain much-needed hard currency. As previously reported, this trend has seen the US government increase the reward money on offer to anybody who can provide intelligence on members of the Lazarus collective.

In terms of other ransomware trends, verticals under attack remained consistent in July, with industrial organisations remaining the most targeted, accounting for 32% of incidents seen by NCC. This was followed by consumer cyclicals – which includes automotive, entertainment and retail – at 17%, and technology at 14%.

NCC found the region most targeted for ransomware attacks was North America, where 42% of incidents were seen during the period, which regained the “prestigious” number one spot from Europe after two months.

As ever, it is important to note that supplier-produced threat data is proprietary and generally reflects only the conditions seen by that supplier based on its own network telemetry or gleaned from its incident response teams, so may not be wholly accurate. Other sources of threat data are available.

 

Source link

cements dominance ecosystem LockBit ransomware
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Is A Pan-National Ecosystem The Key To Europe’s Tech Startup Challenge?

June 24, 2023

How To Build A Partner Ecosystem To Grow Your Business

May 14, 2023

Can The Entrepreneurial Development Ecosystem Create More Unicorns By Splitting In 2?

January 24, 2023

What is a Service Robot? The vision of an intelligent service application is possible.

November 7, 2022
Add A Comment

Comments are closed.

Editors Picks

Cisco averts cyber disaster after successful phishing attack

August 12, 2022

Turnip Boy Robs a Bank announced for PC and Xbox One

September 16, 2022

Compliance automation may be the key to beating regulatory sprawl, Vanta raises $40M   

October 13, 2022

SMITE midseason replace provides extra traditional Nickelodeon characters

July 19, 2022

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Elementor #32036

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2025 behindthescreen.uk - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.