The Prague Post - 'Kisses from Prague': The fall of a Russian ransomware giant

EUR -
AED 4.280149
AFN 74.589844
ALL 96.103506
AMD 438.585722
AOA 1068.726117
ARS 1616.513306
AUD 1.657319
AWG 2.097827
AZN 1.983098
BAM 1.948627
BBD 2.345864
BDT 143.136316
BHD 0.439917
BIF 3461.997697
BMD 1.16546
BND 1.484789
BOB 8.047924
BRL 5.944664
BSD 1.164663
BTN 107.526089
BWP 15.626602
BYN 3.399583
BYR 22843.007863
BZD 2.342466
CAD 1.614616
CDF 2681.722235
CHF 0.92273
CLF 0.026584
CLP 1046.268001
CNY 7.960205
CNH 7.968084
COP 4250.489379
CRC 541.782289
CUC 1.16546
CUP 30.884679
CVE 110.54355
CZK 24.392545
DJF 207.125263
DKK 7.472682
DOP 70.68518
DZD 154.38958
EGP 62.072847
ERN 17.481894
ETB 181.374636
FJD 2.58138
FKP 0.880192
GBP 0.870523
GEL 3.129258
GGP 0.880192
GHS 12.837525
GIP 0.880192
GMD 85.078271
GNF 10232.735437
GTQ 8.910199
GYD 243.673554
HKD 9.128678
HNL 31.024569
HRK 7.531231
HTG 152.690693
HUF 376.849607
IDR 19830.469655
ILS 3.599359
IMP 0.880192
INR 107.551815
IQD 1526.752056
IRR 1532579.354174
ISK 143.806194
JEP 0.880192
JMD 183.34505
JOD 0.826285
JPY 184.993987
KES 150.808729
KGS 101.919296
KHR 4678.154599
KMF 494.732249
KPW 1048.900686
KRW 1729.46006
KWD 0.360372
KYD 0.970573
KZT 556.853329
LAK 25596.40882
LBP 104366.905999
LKR 367.128487
LRD 214.669545
LSL 19.364124
LTL 3.441299
LVL 0.704975
LYD 7.394846
MAD 10.844557
MDL 20.056049
MGA 4822.085966
MKD 61.616474
MMK 2447.472605
MNT 4162.53503
MOP 9.396624
MRU 46.738365
MUR 54.216779
MVR 18.018145
MWK 2024.403485
MXN 20.350661
MYR 4.644315
MZN 74.542802
NAD 19.358408
NGN 1607.145284
NIO 42.807425
NOK 11.16251
NPR 172.044485
NZD 2.002525
OMR 0.448107
PAB 1.164653
PEN 3.966933
PGK 5.022999
PHP 69.382167
PKR 325.163388
PLN 4.255235
PYG 7555.187033
QAR 4.249279
RON 5.093409
RSD 117.34427
RUB 91.552352
RWF 1702.153724
SAR 4.373528
SBD 9.380213
SCR 17.342188
SDG 700.441569
SEK 10.871477
SGD 1.486308
SLE 28.728239
SOS 666.061467
SRD 43.767645
STD 24122.660353
STN 24.987453
SVC 10.191482
SYP 128.840806
SZL 19.36408
THB 37.434205
TJS 11.070424
TMT 4.079109
TND 3.370556
TRY 51.853042
TTD 7.89958
TWD 36.986328
TZS 3015.627307
UAH 50.473474
UGX 4308.934142
USD 1.16546
UYU 47.315816
UZS 14253.571085
VES 552.913721
VND 30689.464518
VUV 139.180276
WST 3.229387
XAF 653.514763
XAG 0.015846
XAU 0.000248
XCD 3.149713
XCG 2.099109
XDR 0.814629
XOF 657.319107
XPF 119.331742
YER 278.049524
ZAR 19.164992
ZMK 10490.533013
ZMW 22.274853
ZWL 375.277511
  • RBGPF

    -13.5000

    69

    -19.57%

  • CMSC

    0.1500

    22.29

    +0.67%

  • VOD

    0.4600

    15.77

    +2.92%

  • RYCEF

    -0.5000

    15.25

    -3.28%

  • NGG

    2.4400

    89.96

    +2.71%

  • GSK

    1.5300

    57.37

    +2.67%

  • BTI

    1.1500

    59.95

    +1.92%

  • RELX

    0.5700

    33.93

    +1.68%

  • RIO

    3.7900

    98.45

    +3.85%

  • BP

    -1.3500

    45.89

    -2.94%

  • AZN

    3.4600

    204.27

    +1.69%

  • CMSD

    0.2100

    22.5

    +0.93%

  • JRI

    0.1600

    12.85

    +1.25%

  • BCC

    4.5200

    79.23

    +5.7%

  • BCE

    0.2900

    24.12

    +1.2%

'Kisses from Prague': The fall of a Russian ransomware giant
'Kisses from Prague': The fall of a Russian ransomware giant / Photo: - - NATIONAL CRIME AGENCY/AFP/File

'Kisses from Prague': The fall of a Russian ransomware giant

The sudden fall of a ransomware supplier once described as the world's most harmful cybercrime group has raised questions about Moscow's role in its development and the fate of its founder.

Text size:

LockBit supplied ransomware to a global network of hackers, who used the services in recent years to attacks thousands of targets worldwide and rake in tens of millions of dollars.

Ransomware is a type of malicious software, or malware, that steals data and prevents a user from accessing computer files or networks until a ransom is paid for their return.

LockBit supplied a worldwide network of hackers with the tools and infrastructure to carry out attacks, communicate with victims, store the stolen information and launder cryptocurrencies.

According to the US State Department, between 2020 and early 2024 LockBit ransomware carried out attacks on more than 2,500 victims around the world.

It issued ransom demands worth hundreds of millions of dollars and received at least $150 million in actual ransom payments made in the form of digital currency.

But LockBit was dealt its first devastating blow in February 2024 when the British National Crime Agency (NCA), working with the US FBI and several other nations, announced it had infiltrated the group's network and took control of its services.

Later that year, the NCA announced it had identified LockBit's leader as a Russian named Dmitry Khoroshev (alias LockBitSupp).

The US State Department said it was offering a reward of up to $10 million for information leading to his arrest.

Lockbit, which the NCA said was "once the world's most harmful cybercrime group", sought to adapt by using different sites.

But earlier this year it suffered an even more devastating breach and received a taste of its own medicine.

Its systems were hacked and some of its data stolen in an attack whose origins were mysterious and has, unusually in the cybercrime world, never been claimed.

"Don't do crime. Crime is bad. Xoxo from Prague," said a cryptic message written on the website it had been using.

- 'Others grow back' -

"Lockbit was number one. It was in survival mode and took another hit" with the leak, said Vincent Hinderer, Cyber Threat Intelligence team manager with Orange Cyberdefense.

"Not all members of the group have been arrested. Other, less experienced cybercriminals may join," he added.

However, observations of online chats, negotiations and virtual currency wallets indicate "attacks with small ransoms, and therefore a relatively low return on investment", he said.

A French cyberdefence official, who asked not to be named, said the fall of LockBit in no way represented the end of cybercrime.

"You can draw a parallel with counterterrorism. You cut off one head and others grow back."

The balance of power also shifts fast.

Other groups are replacing LockBit, which analysts said was responsible in 2023 for 44 percent of ransomware attacks worldwide.

"Some groups achieve a dominant position and then fall into disuse because they quit on their own, are challenged or there's a breakdown in trust that causes them to lose their partners," said Hinderer.

"Conti was the leader, then LockBit, then RansomHub. Today, other groups are regaining leadership. Groups that were in the top five or top 10 are rising, while others are falling."

In a strange twist, the LockBit data leak revealed that one of its affiliates had attacked a Russian town of 50,000 inhabitants.

LockBit immediately offered the town decryption software -- an antidote to the poison.

But it did not work, the French official told AFP.

"It was reported to the FSB (security service), who quietly resolved the problem," the official said.

- 'Complicit' -

One thing appears to be clear -- the field is dominated by the Russian-speaking world.

Among the top 10 cybercrime service providers, "there are two Chinese groups", said a senior executive working on cybercrime in the private sector.

"All the others are Russian-speaking, most of them still physically located in Russia or its satellites," said the executive, who also requested anonymity.

It is harder to ascertain what role the Russian state might play -- a question all the more pertinent since Moscow's 2022 invasion of Ukraine.

"We can't say that the groups are sponsored by the Russian state but the impunity they enjoy are enough to make it complicit," argued the French official, pointing to a "porosity" between the groups and the security services.

The whereabouts and status of Khoroshev are also a mystery.

The bounty notice from the US State Department, which said Khoroshev was aged 32, gives his date of birth and passport number but says his height, weight and eye colour are unknown.

His wanted picture shows an intense man with cropped hair and bulging muscular forearms.

"As long as he doesn't leave Russia, he won't be arrested," said the private sector expert. "(But) we're not sure he's alive."

"The Russian state lets the groups do what they want. It's very happy with this form of continuous harassment," he alleged.

In the past, there was some cooperation between Washington and Moscow over cybercrime but all this changed with the Russian invasion of Ukraine.

French expert Damien Bancal cites the case of Sodinokibi, a hacker group also known as REvil, which was dismantled in January 2022.

"The FBI helped the FSB arrest the group. During the arrests, they found gold bars and their mattresses were stuffed with cash," he said.

But since the invasion of Ukraine, "no-one is cooperating with anyone any more".

Asked if the US has questioned Moscow about Khoroshev after the bounty was placed on his head, Kremlin spokesman Dmitry Peskov said: "Unfortunately, I have no information."

C.Zeman--TPP