• XRATOR
  • Contact Us
  • Privacy & Policy
Conquer your risk
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
Conquer your risk
No Result
View All Result
Home Threat Intelligence

Why Lockbit does fake cyberattacks ?

Lockbit is a ransomware gang. A very competitive criminal segment where they need to attract the best intruders.

Ronan MouchouxbyRonan Mouchoux
November 11, 2022
in Articles, Cyber Attacks, Cybercrime, Malware, Threat Intelligence
0
Why Lockbit does fake cyberattacks ?

On Monday, November 7 of 2022, Lockbit hackers were supposed to publish “highly sensitive and confidential information” of Thales, a French group involved in many defense and national security programs. At 7am, the page of the darknet site shows: “All data is published”. But no file is available. 48 hours later still nothing. And finally on november 11, 4 days late, they are published. No ransom was asked.

Lockbit started their ransomware operation in 2019. They manage since to change the ransomware game and to print their name into this cybercriminal fields. So why does Lockbit is faking cyberattacks ?

Thales' press release about the alleged lockbit intrusionThe Lockbit Ransomware-as-a-Service Game-changer

Lockbit is part of the Ransomware-as-a-Service (RaaS) cybercriminal business. They appeared in 2019 with a unique positioning: self-spreading. It made them unique and gives a competitive edges to their affiliates intruder by automating the unauthorized access expansion tasks. Their competitors affiliates needed days or weeks to compromise a full network. With Lockbit it became a matter of minutes or hours. It is a clear competitive advantage, bringing values to their affiliates.

The second competitive advantage was the decryption support. When a company is infected, either they pay the ransom to get back their file or they loose their files. When choosing option n°1, as a victim, you expect of course to get your files after paying the ransom. If it is not the case, then you will call it a scam.

In some case the decryption process is not that easy. Because of the ransomware developer that did not put enough effort on this feature. Or because of the affiliates that lacks some technical skills. Lockbit did a wonderful job with its decryption support. Both with the decryption process and the online chat you could ping as an affiliates to get help to decrypt a victim. It puts them into the category of “reliable” and “problem solver”.

Lockbit had a clear advantage on most of the other ransomware actors: they understood it was a business. They treated their affiliates and their victims as customers. Their business-first mindset set them apart the competition and is mandatory to understand why they claim fake cyberattacks.

It is all about business … and marketing

In october 2021, Lockbit claimed to manage to break into the aeronautics giant Airbus. After investigation, it appears it was in fact an Airbus employee association. If personal data was indeed compromised, it was nowhere close to an intrusion into the main network of the company.

In january 2022, Thales’ subsidiaries Space Ops was already infected by Lockbit. The attack was real. But the cybercriminal gang exaggerated the importance of the stolen material. Instead of very highly sensitive information, it was low sensitivity data and tools stored on a server outside the defense manufacturer main network.

Cyber attack scope exaggeration, unrealistic amount of the ransom or fake compromising, Lockbit ecosystem did several false claim. It is not uncommon for hacktivist to brag about intrusion they did not perform, but unusual for a ransomware group. Unless, Lockbit is a business-first operation. And then it is more understandable how they exploit the news industry.

By claiming to achieve a huge cyber attack or asking for millions in ransom, the hacker group know they will hit the headlines. News media and blog writer will make articles rain about how incredibly dangerous the group is. And incredibly powerful their product, the ransomware-as-a-service, is. They also probably know that once a news is published, if it is incorrect, the news machinery will be reluctant to push on every channel a retraction. They will silently add an erratum on the bottom of the first article.

Intruders do also read the press. So if you are an affiliates from another RaaS provider and you struggle do decrypt or hit big target, you will be attract to pass a contract with the Lockbit developers. And became one of their affiliates.

Ransomware-as-a-Service (Raas) Economic Model

Lockbit need a constant stream of new ransomware operator as some of them get arrested by law enforcement or change for more competitive ransomware supplier.

 

Why Lockbit does not ask for a ransom?

In Thales’ october 2022 case, the ransomware group do even bother to ask for a ransom. Instead the group engage customer to take legal action against the victim company for confidentiality breach. The cybercriminal group offers the best of their abilities in such a legal procedures.

Lockbit ransomware group offer its assistance to Thales' customer to take legal action for breach of confidentiality.

This is a classical “Robin Hood” criminal behavior where the perpetrator justify its crimes by invoking the greater common good. It is also known in criminology as the Social Conflict Theory.

Lockbit demonstrated previously a great sense of business in their criminal enterprise. We can then doubt that they suddenly transform into a benevolent hacktivist group. If we consider that their stated intention are not performed in the interest of Thales’ customers, then we can advance with two non mutually exclusive hypothesis:

  1. PR Stunt: Lockbit is playing with the media machinery. They hack into a big sensitive company, don’t ask ransom a say they will publish for free everything. That is a first burst of articles. At the date they should have release the stolen files, nothing happened. Second firing of articles calling for scam. They finally unleashed the materials. Third waves of media coverage. We can for sure bet for at least of fourth shake when people will have review the stolen document, discussed its content and sensitivity.
  2. Already paid job: Lockbit was commissioned by a third party to do the job. The group had already been paid at least partially. The final motivation would be to create noise, confusion or destabilization. Thales reputation is hurt, whatever the sensitivity of the stolen material is. The sponsor could then be a competitor or a foreign state seeking for organizational gain by striking a major western defense industry player.

Conclusion

Lockbit claim fake cyberattacks because it is a very effective way to advertise their service. Ransomware developers make no money if they don’t have effective and skilled intruders and affiliates. This communication strategy allow them to catch the attention of scare resources and drive them away from the competition. More skilled affiliates means more money for the malware developers. A very sound business move. And if they can endorse the Robin Hood costume by performing sponsored operation disguised as hacktivism operation, and it is paying, then why not ?

 

 

Tags: CriminologyHacktivismLockbitPersonal Dataransomware

Categories

  • Cybercrime
  • Malware
  • Vulnerability & Weakness
  • Threat Intelligence
  • Cyber Attacks
  • Cybersecurity
  • Offensive Security
  • Risk Management
  • Cyberdefense
  • Cyber Insurance

Popular News

  • Cybercriminals regularly hack into individual and organization network. They may steal password to sell them on the darkweb.

    4 websites to check if your password is in the darkweb

    0 shares
    Share 0 Tweet 0
  • 10 Essential Tools for IoT Pentesting

    0 shares
    Share 0 Tweet 0
  • Threat Modeling : from Software Security to Cyber Risk Management

    0 shares
    Share 0 Tweet 0
  • 8 TV Shows and Movies about Personal Data Abuse

    0 shares
    Share 0 Tweet 0
  • The Code Knight: Mastering the Craft of Defensive Programming

    0 shares
    Share 0 Tweet 0

"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.

Categories

  • Articles
  • Cyber Attacks
  • Cyber Insurance
  • Cybercrime
  • Cyberdefense
  • Cybersecurity
  • Malware
  • News
  • Offensive Security
  • Research
  • Risk Management
  • Scams
  • State of the art
  • Threat Intelligence
  • Uncategorized
  • Vulnerability & Weakness

Quick Links

  • XRATOR
  • Our Experts
  • Privacy Policy
  • Contact Us

XRATOR® – copyright 2020-2021

No Result
View All Result
  • Contact Us
  • Homepages

© 2018 JNews by Jegtheme.

Manage Cookie Consent
We use cookies to optimize our website and our service.
By closing this windows, you automatically deny non-functionals cookies.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}