Monday, May 19, 2025
HomeCyber Security NewsLockBit Ransomware Group Breached: Internal Chats and Data Leaked Online

LockBit Ransomware Group Breached: Internal Chats and Data Leaked Online

Published on

SIEM as a Service

Follow Us on Google News

The notorious LockBit ransomware group, once considered one of the world’s most prolific cyber extortion rings, has itself become the victim of a major cyberattack.

On May 7, attackers breached and defaced the group’s dark web sites, leaking a trove of operational data and internal chats in a stunning turn of events that sent shockwaves through the cybersecurity community.

Visitors to LockBit’s dark web portals were greeted by a defiant message: “Don’t do crime CRIME IS BAD xoxo from Prague,” along with a download link to “paneldb_dump.zip,” which contains what appears to be a comprehensive MySQL database dump.

- Advertisement - Google News

The attackers’ identity remains unknown, but their message leaves little doubt about their intent to embarrass and expose LockBit.

Website Hacked
Website Hacked

Security researchers have authenticated the data as real, describing the leak as a “goldmine for law enforcement.”

The exposed database includes about 60,000 unique Bitcoin wallet addresses allegedly used in ransom payments, nearly 4,500 negotiation chat logs between LockBit operators and their victims dating back to December, and details on custom-built ransomware variants for specific attacks.

Plaintext Passwords, Admin Details Exposed

The leak’s most damning content may be a user table containing plaintext passwords for 75 LockBit administrators and affiliates, a glaring security oversight for a group that specialized in breaching others.

According to Alon Gal, CTO and Co-Founder of Hudson Rock, the information “could significantly aid in tracing cryptocurrency payments and attributing attacks to specific threat actors.”

Bitcoin address
Bitcoin address

In the wake of the breach, LockBit sought to downplay the incident with a message in Cyrillic on their leak site.

The group insisted that only a “light panel” with autoregistration was compromised, and claimed that no decryptors or stolen company data were affected.

Company Data
Company Data

Attempting to turn the tables, LockBit offered a reward for information about the Prague-based hacker behind the attack.

The timing couldn’t be worse for LockBit, which was already reeling from Operation Cronos, a February 2024 global law enforcement operation that temporarily disabled its infrastructure.

While the group managed to bounce back, analysts noted that recent LockBit victim claims often recycled previous attacks.

Experts draw parallels between this breach and a recent attack on the Everest ransomware operation, both tied to a PHP 8.1.2 vulnerability (CVE-2024-4577) enabling remote code execution.

For LockBit-responsible for nearly 44% of ransomware attacks globally in early 2023-this breach is more than a setback.

The exposure of affiliates’ credentials and operational details could permanently damage the group’s credibility and cripple their future activities.

Setting Up SOC Team? – Download Free Ultimate SIEM Pricing Guide (PDF) For Your SOC Team -> Free Download

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

New Report Finds 67% of Organizations Experienced Cyber Attacks in the Last Year

A disturbing 67% of businesses in eight worldwide markets—the US, UK, Spain, the Netherlands,...

Auth0-PHP Vulnerability Enables Unauthorized Access for Attackers

Critical security vulnerability has been discovered in the Auth0-PHP SDK that could potentially allow...

Active Exploitation of Ivanti EPMM Zero-Day Vulnerability in the Wild

Security researchers at The Shadowserver Foundation have identified active exploitation attempts targeting a critical...

Hacker Arrested for Taking Over SEC Social Media to Spread False Bitcoin News

Alabama man has been sentenced to 14 months in prison for orchestrating a sophisticated...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

New Report Finds 67% of Organizations Experienced Cyber Attacks in the Last Year

A disturbing 67% of businesses in eight worldwide markets—the US, UK, Spain, the Netherlands,...

Auth0-PHP Vulnerability Enables Unauthorized Access for Attackers

Critical security vulnerability has been discovered in the Auth0-PHP SDK that could potentially allow...

Active Exploitation of Ivanti EPMM Zero-Day Vulnerability in the Wild

Security researchers at The Shadowserver Foundation have identified active exploitation attempts targeting a critical...