Almost 60,000 Bitcoin addresses related to the infrastructure of the Lockbit Ransomware software was leaked after hackers violated the Dim Web Patl Group.
The leakage included a database of MySQL database publicly made available online. This included Information related to cryptographic, which can facilitate blockchain analysts to follow the illegal financial flows of the group.
Ransomware is a kind of malware used by malicious actors. It blocks the files or computer systems of the target, which makes them inaccessible. Attacks usually require ransom payments, often in digital assets, such as Bitcoin (BTC), in exchange for deciphering the key to unlock files.
Lockbit is one of the most celebrated groups of cryptocurrencies. In February 2024, 10 countries began a joint operation of the group’s disruption, saying that the organization caused billions of damage to key infrastructure.
No private Bitcoin keys
While almost 60,000 bitcoin portfolios were not included, private keys were not included. One user x common Interview with the Lockbit Operator, confirming the violation. However, the blocking person said that private keys or data were not lost.
Despite this, Bleeping Computer Analysts stated that the database contained 20 tables, including the “compilation” table. This included individual ransomware compilations created by associated organizations. The data was also identified by some target companies for compilation.
In addition, the leaking database also contained the table of “chats”. This table contained over 4,400 negotiating messages between victims and the organization of ransomware software.
Related: Cryptographic crime in 2024
Lockbit Hack associated with Everest Ransomware violation
It is not clear who is in the violation and as they reached the Lockbit Operation, but computer analysts stated that the message used on the Everest Ransomware website leveled this used in Lockbit. Analysts suggested that there may be a relationship between these two incidents.
The violation emphasized the role that the crypto plays in the economy of ransomware software. Each victim is usually assigned to the address of the ransom payment, enabling associated entities to monitor payments while trying to send connections with the main wallets.
The exhibition of addresses allows investigators of law enforcement and blockchain to follow patterns and potentially combine earlier payments of ransom with known wallets.
https://www.youtube.com/watch?v=ndv0rfeetq
Warehouse: Adam Back says that the Bitcoin price cycle “10 x larger”, but will still definitely break up above 100,000 USD
