<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>LockBit &#8211; Crypto Market Insights: Dive In with CryptoUpdate.io</title>
	<atom:link href="https://cryptoupdate.io/tag/lockbit/feed/" rel="self" type="application/rss+xml" />
	<link>https://cryptoupdate.io</link>
	<description>Latest cryptocurrency news, market updates and analysis</description>
	<lastBuildDate>Thu, 08 May 2025 12:00:48 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>Cybercriminals Beware: LockBit Ransomware Gang&#8217;s Bitcoin Addresses Exposed in Counter-Hack</title>
		<link>https://cryptoupdate.io/2025/05/08/cybercriminals-beware-lockbit-ransomware-gangs-bitcoin-addresses-exposed-in-counter-hack/</link>
					<comments>https://cryptoupdate.io/2025/05/08/cybercriminals-beware-lockbit-ransomware-gangs-bitcoin-addresses-exposed-in-counter-hack/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Thu, 08 May 2025 12:00:48 +0000</pubDate>
				<category><![CDATA[Bitcoin News]]></category>
		<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Bitcoin]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[LockBit]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/05/08/cybercriminals-beware-lockbit-ransomware-gangs-bitcoin-addresses-exposed-in-counter-hack/</guid>

					<description><![CDATA[<p>A recent hack has turned tables on the infamous ransomware collective LockBit, revealing a whopping 59,975 Bitcoin addresses, public keys, and 4,442 instances of hostage negotiations. The notorious cybercriminal organization, known for deploying Ransomware-as-a-Service (RaaS), develops tools and structures for affiliates to execute attacks. Like many ransomware gangs, LockBit demands its victims pay in cryptocurrencies [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/05/08/cybercriminals-beware-lockbit-ransomware-gangs-bitcoin-addresses-exposed-in-counter-hack/">Cybercriminals Beware: LockBit Ransomware Gang&#8217;s Bitcoin Addresses Exposed in Counter-Hack</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A recent hack has turned tables on the infamous ransomware collective LockBit, revealing a whopping 59,975 <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>Bitcoin</a> addresses, public keys, and 4,442 instances of hostage negotiations. The notorious cybercriminal organization, known for deploying Ransomware-as-a-Service (RaaS), develops tools and structures for affiliates to execute attacks.</p>
<p>Like many ransomware gangs, LockBit demands its victims pay in cryptocurrencies such as <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>Bitcoin</a> (BTC) or Monero (XMR). Victims are often coerced into sending funds to specific wallet addresses to access decryption keys or prevent data leaks. Affiliates then usually attempt to clean the funds using mixers, cross-chain swaps, or privacy coins to dodge detection.</p>
<p>The dark web platforms of LockBit affiliates were altered with a message containing a link to a database dump. The message stated, &ldquo;Don&rsquo;t do crime CRIME IS BAD xoxo from Prague,&rdquo; according to cybersecurity publication, Bleeping Computer.</p>
<p>BleepingComputer&rsquo;s examination of the leaked LockBit database, first highlighted by the <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cyber</a> threat actor, Rey, revealed 20 tables with revealing details. One table includes almost 60,000 <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>Bitcoin</a> addresses, likely a combination of addresses used by the gang&rsquo;s affiliates and infrastructure. Another reveals ransomware builds specific to certain targets. The leak also discloses configuration details for attacks, such as which servers to avoid or which files to encrypt. A chat log unveils over 4,400 negotiations between the ransomware operation and its victims, and a user table names 75 admins and affiliates, with passwords in plain text, including samples like &ldquo;Weekendlover69&rdquo; and &ldquo;Lockbitproud231.&rdquo;</p>
<p>A LockBit operator known as &ldquo;LockBitSupp&rdquo; confirmed the breach to Rey, ensuring that no private keys were leaked. Bleeping Computer indicates that the database dump likely occurred around April 29, as suggested by the MySQL timestamp and the latest chat record. However, the identity of the individual or group behind the breach and the means by which it was executed are still unknown. The defacement message mirrors one used in a recent attack on Everest ransomware&rsquo;s dark web site, hinting at a potential connection.</p>
<p>The server was found to be running PHP 8.1.2, which is vulnerable to CVE-2024-4577 &ndash; a critical flaw that can facilitate remote code execution. In February 2024, Operation Cronos, an international law enforcement initiative, dismantled LockBit&rsquo;s infrastructure, seizing 34 servers, stolen data, <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> addresses, 1,000 decryption keys, and its affiliate panel. Despite this setback, LockBit managed to rebuild and resume operations, only to face another significant blow in May of the same year when U.S. authorities unmasked and indicted its ringleader, Dmitry Khoroshev, on 26 criminal counts.</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/05/08/cybercriminals-beware-lockbit-ransomware-gangs-bitcoin-addresses-exposed-in-counter-hack/">Cybercriminals Beware: LockBit Ransomware Gang&#8217;s Bitcoin Addresses Exposed in Counter-Hack</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/05/08/cybercriminals-beware-lockbit-ransomware-gangs-bitcoin-addresses-exposed-in-counter-hack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Russian Cybercriminal Accused in $200M Crypto Ransomware Attack on US Infrastructure</title>
		<link>https://cryptoupdate.io/2023/05/17/russian-cybercriminal-accused-in-200m-crypto-ransomware-attack-on-us-infrastructure/</link>
					<comments>https://cryptoupdate.io/2023/05/17/russian-cybercriminal-accused-in-200m-crypto-ransomware-attack-on-us-infrastructure/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Wed, 17 May 2023 07:54:36 +0000</pubDate>
				<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Cryptocurrency Regulations]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Babuk]]></category>
		<category><![CDATA[Crypto Ransomware]]></category>
		<category><![CDATA[Hive]]></category>
		<category><![CDATA[LockBit]]></category>
		<category><![CDATA[Mikhail Pavlovich Matveev]]></category>
		<category><![CDATA[Russian Hacker]]></category>
		<category><![CDATA[US Department of Justice]]></category>
		<category><![CDATA[US Infrastructure]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/?p=6992</guid>

					<description><![CDATA[<p>The US Department of Justice has indicted Russian national Mikhail Pavlovich Matveev for a crypto-ransomware attack on US infrastructure, amounting to a $200 million heist.</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2023/05/17/russian-cybercriminal-accused-in-200m-crypto-ransomware-attack-on-us-infrastructure/">Russian Cybercriminal Accused in $200M Crypto Ransomware Attack on US Infrastructure</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The US Department of Justice (DOJ) has indicted a Russian national for a crypto-ransomware attack on US infrastructure, unsealing two charges against the individual in question.</p>



<p><strong>The Accused and the Charges</strong></p>



<p>Mikhail Pavlovich Matveev, also known by aliases such as Wazawaka, m1x, Boriselcin, and Uhodiransomwar, stands accused of conducting a wide-scale attack against several victims across the US. The affected sectors spanned law enforcement agencies in Washington, D.C. and New Jersey, along with other victims in the healthcare sector and other industries nationwide.</p>



<p>Matveev&#8217;s attack dates back to 2020, deploying ransomware variants LockBit, Babuk, and Hive. Reports indicate that Matveev demanded as much as $400 million in ransom payments, successfully making off with $200 million.</p>



<p>Assistant Attorney General Kenneth A. Polite, Jr. of the Justice Department’s Criminal Division, in a statement regarding Matveev, said, &#8220;From his home base in Russia, Matveev allegedly used multiple ransomware variants to attack critical infrastructure around the world. We will not relent in imposing consequences on the most egregious actors in the cybercrime ecosystem.”</p>



<p><strong>A Closer Look at Wazawaka</strong></p>



<p>Matveev, a notorious figure in the cybercrime landscape, reportedly went rogue in 2022, posting exploit codes and taunting researchers and journalists. His carefree attitude in the face of increased scrutiny from ransomware groups seems to have finally caught up with him, as demonstrated by recent law enforcement action.</p>



<p>He frequently shared information about his attacks, contradicting the caution exercised by other ransomware groups. Soon, publishers started sharing selfies and videos associated with Matveev, further exposing his activities.</p>



<p><strong>Continued Activity by Russian Hackers in the Crypto Sphere</strong></p>



<p>Russian hackers have consistently been implicated in cryptocurrency-related attacks. In 2022, a Russian national pleaded not guilty to charges of laundering ransom payments from attacks on US infrastructure. Russian entities have also targeted a Ukrainian gas company.</p>



<p>However, not all activities have been overtly malevolent. An anonymous &#8220;Robin Hood&#8221; attacker has made headlines for stealing funds from Russian law enforcement and donating them to Ukraine.</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2023/05/17/russian-cybercriminal-accused-in-200m-crypto-ransomware-attack-on-us-infrastructure/">Russian Cybercriminal Accused in $200M Crypto Ransomware Attack on US Infrastructure</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2023/05/17/russian-cybercriminal-accused-in-200m-crypto-ransomware-attack-on-us-infrastructure/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
