Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

LockBit (ACBD, LockBit 2.0 - .lockbit, .lock2bits, .luckyday) Support Topic


  • Please log in to reply
132 replies to this topic

#121 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 65,330 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:03:26 AM

Posted 01 February 2023 - 07:44 PM

As I have repeatedly said most security experts will advise against paying the ransom demands or engage in negotiating a payment with the malware developers for reasons expressed here and elsewhere by other victims.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


BC AdBot (Login to Remove)

 


#122 CoastalData

CoastalData

  •  Avatar image
  • Members
  • 85 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:26 AM

Posted 16 February 2023 - 10:01 AM

This site claims to be able to restore Lockbit encrypted files... Are they a.) lying, b.) in league with the scammers, or c.) holding out on us and hording the decryptor for personal gain?

 

https://monstercloud.com/cyber-security/ransomware-removal/ 



#123 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 65,330 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:03:26 AM

Posted 16 February 2023 - 10:12 AM

Bleeping Computer cannot vouch for those who claim they can decrypt data or help in other ways. We have have no way of knowing the background, expertise and motives of all companies or individuals who indicate decryption is possible. We have no way of vetting whether a person has a true technical method of recovering files, is scamming users by just paying ransoms for the key, or are the ransomware operators themselves. For the same reason, members are discouraged from providing remote access to unknown individuals or to provide data that could potentially be stolen. We advise to be cautious with whomever you are dealing with, what services they are able to provide and what claims they make before sending money or paying a fee to anyone. 
 
In regards to data recovery services specifically, they typically act as a "middleman", pay the criminals...pretend they cracked the decryption and charge the victim more than the ransom demands, in many cases not telling them that is how they acquired the means of decryption. Other data recovery services hide the actual ransom cost from clients and/or mark the cost up exponentially as noted here
 
Some data recovery services operate more like scammers while others like Fast Data Recovery have been reported to make false claims to be able to decrypt data by ransomware which is not decryptable and charge an assessment fee. Many of them instruct victims to submit one or two limited size files for free decryption as 100% proof they can decrypt the files with claims of 100% guaranteed success, collect the victim's money and are never heard from again. The criminals behind creating and spreading ransomware do the same.
 
Experts have identified Proven Data, Red Mosquito, MonsterCloud, Dr. Shifro and Fast Data Recovery as some of the most dishonest and predatory data recovery services. Connecticut-based Coveware CEO Bill Siege refers to such data recovery services as "ransomware payment mills".
 
Please read my comments in this topic for information as to what we know about those who claim they can decrypt data including using and paying data recovery services.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#124 CoastalData

CoastalData

  •  Avatar image
  • Members
  • 85 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:26 AM

Posted 16 February 2023 - 11:12 AM

Thank you very much for that excellent explanation and informative reply.



#125 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 65,330 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:03:26 AM

Posted 16 February 2023 - 01:39 PM

You're welcome.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#126 CoastalData

CoastalData

  •  Avatar image
  • Members
  • 85 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:26 AM

Posted 16 February 2023 - 02:14 PM

What is the entry point for a LockBit infection, could it be an infected Word document? 

 

My EDR caught an infected word document at another customer's location, and I'm wondering if we just stopped a ransomware attack there.

 

Should I open a thread and upload that infected document?



#127 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 65,330 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:03:26 AM

Posted 16 February 2023 - 03:06 PM

Ransomlware and other forms of malware spread via a variety of attack vectors. According to BlackBerry Research and Intelligence Team (Threat Bulletin: Ransomware 2020 - State of Play)...criminals have shifted from widespread, indiscriminate distribution to highly targeted campaigns deployed via compromised Managed Security Service Provider (MSPs) and RDP brute force compromise both common attack vectors for servers particularly by those involved with the development and spread of ransomware. Another common method to spread ransomware is by using pirated software, adware bundles, fake/illegal activators for Windows & Office and other cracked software.
 
Section :step2: in this topic explains in more detail the most common methods crypto malware is typically delivered and spread.

.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#128 Riki-alban

Riki-alban

  •  Avatar image
  • Members
  • 33 posts
  • OFFLINE
  •  
  • Gender:Male

Posted 05 January 2024 - 11:18 AM

is create



#129 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 65,330 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:03:26 AM

Posted 05 January 2024 - 01:19 PM

Create what?


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#130 Riki-alban

Riki-alban

  •  Avatar image
  • Members
  • 33 posts
  • OFFLINE
  •  
  • Gender:Male

Posted 05 January 2024 - 01:44 PM

has any decrypter been created?

#131 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 65,330 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:03:26 AM

Posted 07 May 2024 - 07:14 PM

LockBit ransomware admin identified, sanctioned in US, UK, Australia


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#132 Far_Call

Far_Call

  •  Avatar image
  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:04:26 PM

Posted 07 May 2024 - 08:46 PM

Been a few years now since they hit me and we have moved on without all our previous data unfortunately.   Hopefully this reduces the incidents and the pain people go through in the future.



#133 Paskis

Paskis

  •  Avatar image
  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:10:26 AM

Posted 08 May 2024 - 06:08 AM

 

 

While law enforcement originally stated that they were able to obtain 1,000 decryption keys as part of Operation Cronos, today's announcement reveals that they were able to obtain an additional 1,500 decryption keys and are continuing to assist LockBit victims in recovering their files for free.

So are the decryption keys already available? How do I know that they have the key for my encrypted data, for example?






1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users