Operation Cronos locks down LockBit – for a while
Thomas Murray
Global Risk Intelligence | Safeguarding clients and their communities since 1994
The cyber crime month in review ?
A rare (if short-lived) victory, fake news and… a black cat?
“Sophisticated tactics and a ruthless approach.” In the world of cyber security that description would usually apply to the actions of a particularly adept ransomware group. In a refreshing change, however, in February the compliment went to the law enforcement agencies behind Operation Cronos. The UK’s National Crime Agency and the US FBI scored a rare and significant victory against the LockBit gang. The celebrations did not last long, as LockBit were back on a different site within days, but even so it has damaged the group’s reputation and will have sparked panic in the ranks.
The other February cyber headlines were dominated by the supply chain breach of Bank of America, and the ALPHV (aka BlackCat, aka Noberus) attack on Prudential Financial.
But which one of these stories is beginning to look like fake news??
1. Bank of America customers on alert: data potentially exposed in third-party breach
Summary
Thousands of Bank of America customers are on alert after a data breach at Infosys McCamish Systems (IMS). IMS is a third-party vendor handling deferred compensation plans on Bank of America's behalf. The incident highlights the growing risk of supply chain attacks on financial institutions through their third-party suppliers.
What happened
The LockBit group compromised IMS systems on 3 November 2023. The ransomware attack potentially exposed the personal information of 57,028 Bank of America customers with deferred compensation plans.
Exposed data may include names, addresses, dates of birth, social security numbers, and other account details.
Bank of America has notified affected customers, and offered two years of complimentary identity theft protection services.
What we know
Threat actors did not breach Bank of America directly. This is often the case with cyber attacks on financial institutions. Cyber criminals find it much easier to target those in the supply chain entrusted with sensitive customer data instead.
No confirmation exists of actual data misuse in this case. Even so, the risk of identity theft and financial fraud remains.
The bigger picture
This incident underscores the growing importance of robust cyber security measures for both financial institutions and their supply chains. It highlights the need for increased transparency and communication during data breaches to minimise customer anxiety and potential harm. Here’s a breakdown of the key cyber risks emanating from the supply chain:
2. Prudential affected by ALPHV
The cyber security landscape is a battlefield, and financial institutions are prime targets. The ALPHV ransomware group, also known as BlackCat, recently claimed responsibility for attacks on LoanDepot and Prudential Financial. But with conflicting reports and limited information, the true picture remains murky.
Prudential acknowledges incident, denies data breach
In February 2024, news outlets reported that ALPHV listed both LoanDepot and Prudential as its victims.
Prudential confirmed an unauthorised access attempt in an official filing. The data breach compromised employee and contractor data, but did not involve any customer or client data. The type of attack and methods used remain unconfirmed, however ALPHV do mention that they possess legitimate credentials.
领英推荐
ALPHV makes bold claims, but are they true?
ALPHV (also known as BlackCat and Noberus) is a prominent Ransomware-as-a-Service (RaaS) group. It has been a significant threat in the cyber security landscape ever since it emerged in late 2021. It has targeted various industries (including finance, healthcare, and government entities) with sophisticated tactics and a ruthless approach.
Key characteristics:
ALPHV's data leak website lists both companies, suggesting a successful breach. It even claimed continued access to Prudential's network and threatened to release stolen data. Prudential, however, says it is still investigating the extent of the incident.
There has been a recent trend of ransomware gangs falsely claiming to have access to data, because they know the implications for their victims – particularly those victims in regulated industries. These false claims show an increasing desperation as more organisations are refusing to pay ransoms.
At the time of writing, it is impossible to determine which data hackers have exfiltrated. If ALPHV is indeed telling the truth, it is likely that the group will share its proof on its shaming site. But it is reasonable to expect that ALPHV would have done this by now, and the data may never materialise.
3. LockBit shaming site seized?
The NCA and international law enforcement dismantles notorious LockBit ransomware group (for a while, at least)
A coalition of international law enforcement agencies successfully disrupted the operations of the LockBit ransomware group in February 2024. This takedown, which involved the UK’s National Crime Agency (NCA) and the FBI, is significant for several reasons.
LockBit's impact
Takedown details
The takedown doesn't eradicate the entire ransomware ecosystem. Disrupting a prolific group like LockBit does, however, send a strong message. It also eased the immediate pressure on targeted sectors.
A key finding from this takedown is the fact that LockBit never deleted data after a victim had paid the ransom. It has long been speculated that these gangs were still storing the data and proves – once again – that you cannot trust criminals with your data. This should act as a warning to those contemplating paying future ransoms.
To add insult to LockBit’s injury, the NCA and FBI used its shaming site to post about their own activities and offer guidance to LockBit's victims. They then took the site offline on 24 February.
This feeling of triumph did not last long. As expected, LockBit returned with a new shaming site and a new list of victims. It also addressed the takedown and how it believes law enforcement was able to do it. The group added an element of conspiracy by stating that it was targeted because it has information on Donald Trump that could affect the upcoming US election. LockBit has since stated that it will target “.gov” domains more often.
Cyber Risk
We bring the best of our collective experience, energy and creative power to fiercely safeguard our clients and fortify their communities. Learn more.