The LockBit ransomware gang has launched a new data leak site that will be used as part of a double blackmail strategy aimed at scaring victims to pay a ransom.
Since the end of 2019, ransomware gangs have adopted a double blackmail tactic by stealing unencrypted files before encrypting them. computers of a network.
Gangs of ransomware then use the stolen files and threaten users to post the data on leak sites to force them to pay a ransom.
Released Lockbit data leak site
According to cybersecurity company Kela, the hackers behind the LockBit ransomware posted a link of their new data leak site on a Russian-speaking hacking forum.
The data leak site so far contains two victims, an automation parts manufacturer and a shipping company.
With the release of their leaked website, it is unknown if they are moving away from this "cartel" or simply want a dedicated website under the control their.
All ransomware attacks should be considered data breaches as ransomware operators not only steal data but also investigate documents to see what they contain.
With the release of the LockBit website, there are now a total of 17 ransomware leak sites used for double blackmail tactics.