[Interpol Alert] LockBit Ransomware Attacks Affect American SMB's

Stu Sjouwerman | Aug 5, 2020

lockbit ransomware attackIf you thought LockBit ransomware has gone away, think again. According to a recent report from Interpol, the impact of COVID-19 on cybercrime has taken shape and LockBit operators are targeting American SMB's.

The report generated by Interpol's Cybercrime Directorate includes data from 48 Interpol countries and 4 private partners. This analysis was also from Interpol's Cybercrime Threat Response and its Cyber Fusion Centre. The International Criminal Police Organization (Interpol) says [PDF] that "a ransomware campaign carried out mainly through LOCKBIT malware is currently affecting medium-sized companies in some countries within this region."

LockBit is a human-operated Ransomware-as-a-Service (RaaS) operation that surfaced in September 2019 as a private operation targeting enterprises and later observed by Microsoft while targeting healthcare and critical services. This ransomware strain's operators use the publicly available CrackMapExec penetration testing tool to move laterally once they get a foothold on a victim's network.

Two months ago, LockBit partnered with Maze ransomware's operators to create an extortion cartel that allows them to share the same data leak platform during their operations and to exchange tactics and intelligence.

Based on their analysis, CERBER, NetWalker, and Ryuk were the top ransomware families recently detected by Interpol private partners and they are seen as "constantly evolving to maximize the potential damage of a single attack as well as the financial profit for its perpetrators."

"In the first two weeks of April 2020, there was a spike in ransomware attacks by multiple threat groups which had been relatively dormant for the past few months," the Interpol added. "This implies that there may still be organizations that have been infected but where the ransomware has not yet been activated."

Interpol recommends organizations exposed to ransomware attacks to keep their software and hardware up to date, and to back up their data using offline storage devices to block ransomware operators from accessing and encrypting them. New-school security awareness training can ensure your users can spot the warning signs of a ransomware attack. 

Bleeping Computer has the full story

Topics: Ransomware

Ransomware Simulator

Free downloadable software tool

Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

RanSim gives you a quick look at the effectiveness of your existing network protection. RanSim will test 24 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

RansIm-Monitor3Here's how it works:

  • 100% harmless simulation of real ransomware and cryptomining infections
  • Does not use any of your own files
  • Tests 25 types of infection scenarios
  • Just download the installer and run it
  • Results in a few minutes!

Get RanSim!

Secure the Digital Workforce: Human + AI

KnowBe4 empowers the modern workforce to make smarter security decisions every day. Trusted by more than 70,000 organizations worldwide, KnowBe4 is the pioneer of digital workforce security, securing both AI agents and humans. The KnowBe4 Platform provides attack simulation and training, collaboration security, and agent security powered by AIDA (Artificial Intelligence Defense Agents) and a proprietary Risk Score. The platform leverages 15 years of behavioral data to combat advanced threats including social engineering, prompt injection, and shadow AI. By securing humans and agents, KnowBe4 leads the industry in workforce trust and defense.