Needless to say, we’re not banking on this persistent education sector threat going away anytime soon.Īfter LockBit, ALPHV (aka BlackCat) and Royal again topped the list of most known victims last month. The apparently Russian-based group tallied just two victims on its leak site in February, but-true to their modus operandi-both of them were educational institutions: Guildford County School, a specialist music academy in London, and Mount Saint Mary College, a liberal arts college in New York. Lockbit and Royal Mail negotiationsĬonfirmed attacks by Vice Society, the ransomware gang infamous for wreaking havoc on the education sector, reached their three-month low last month. Royal Mail rejected the demand, calling it ‘absurd’, and LockBit consequently published the files it stole from the company-but not without also leaking a chat history showing the negotiations between the two parties, which featured the unusual sight of a Royal Mail negotiator giving the feared ransomware gang the runaround. In early February LockBit tried to get $80 million out of the UK's Royal Mail-the largest demand since asking Continental for $50 million in 2022. Speaking of ransom demands, it seems like that’s another area where LockBit broke records last month. LockBit claimed that ION Group had paid the ransom and demanded $2 million from Pierce Transit. Known ransomware attacks by gang, February 2023 Known ransomware attacks by country, February 2023 Known ransomware attacks by industry sector, February 2023Ĭompanies attacked along LockBit’s warpath last month include financial software firm ION Group and Pierce Transit, a public transit operator in Washington state. In February, the most widely used ransomware-as-a-service (RaaS) posted a total of 126 victims on its leak site-a record high since we started tracking the leaks in February 2022. ![]() ![]() It seems like LockBit wasn’t content with having us merely crown them as one of the five most serious cyberthreats facing businesses in 2023. ![]() This information represents victims who were successfully attacked but opted not to pay a ransom. This article is based on research by Marcelo Rivero, Malwarebytes' ransomware specialist, who builds a monthly picture of ransomware activity by monitoring the information published by ransomware gangs on their Dark Web leak sites.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |