Skip to content

Hack on LockBit Ransomware Group: Over 60,000 Bitcoin Wallet Addresses and Victim Negotiation Details Unveiled

Hack on LockBit ransomware's dark web setup uncovers over 60,000 Bitcoin addresses and numerous victim chats, potentially assisting law enforcement in monitoring their activities.

Hack on LockBit ransomware group's dark web base uncovers 60,000 Bitcoin addresses and countless...
Hack on LockBit ransomware group's dark web base uncovers 60,000 Bitcoin addresses and countless victim discussions, potentially aiding law enforcement in monitoring their activities.

Urban Take on LockBit Ransomware Hack

Hack on LockBit Ransomware Group: Over 60,000 Bitcoin Wallet Addresses and Victim Negotiation Details Unveiled

It's going down for the LockBit ransomware crew! These cybercriminals got their dark web lair hacked, baby! Unknown hacksitter hit their panels with a Defcon 1 warning: "No cap, don't do crime. CRIME IS BAD, smooches from Prague."

The hacksitter dropped a "paneldb_dump.zip" file, and when you open that baby up, you find a MySQL database dump filled with LockBit's secret sauce. Rey and the cyberheads at BleepingComputer got their eyes on this, and it looks like the breach happened on the 29th of April, 2025.

What's Revealed

The leaked data includes:

  1. Ransom Wallets Galore: Over 59k BTC addresses linked to LockBit operations were exposed, shining a light on the digital paths for their dirty cash.
  2. Negotiation Money Talks: Nearly 4.5k chats between LockBit and their victims were spilled, offering a peek into their tight-lipped extortion game.
  3. Private Keys or No? According to LockBit crew members, no private keys were pinched. Phew! But that's not stopping the RIP for their rep.
  4. Toasty Passwords: Shockingly, passwords of 75 admins and affiliates were left plain as day in the database. Some examples: "Weekendlover69" and "LockbitProud231."
  5. System Vuln Exposed: Philly 8.1.2, with a known critical vulnerability (CVE-2024-4577), might have been the entryway for attackers. Cheers to poor security!

It looks like the defacement message matches one used in the Everest ransomware site breach, hinting at a possible conn nection. This ain't LockBit's first rodeo. In 2024, they fell victim to Operation Cronos, which took a chunk out of their game. They rebounded, but this new hack deals another blow to their rep.

If you thought that was the end of it, think again, 'cause other ransomware clans like Conti, Black Basta, and Everest have experienced similar leaks. Cryptocurrency, you just got exposed!

With all these exposed addresses, Blockchain investigators and law enforcement can dig into payment patterns, potentially linking past ransom payments to known wallets.

Though LockBit claims no private keys were exposed, the breach still reveals a treasure trove of intel about their operations. This data could help authorities ID group members and trace their financial shenanigans.

Advertise Here

Bonus Information

  • The recent hack has significantly impacted LockBit's operations:
  • Infrastructure Disruption: The breach may disrupt LockBit's ability to coordinate attacks and communicate with affiliates.
  • Reputation and Trust: The exposure of sensitive internal information and panel defacement may erode trust and affect operational capacity.
  • Leaked Sensitive Information:
  • Crypto Wallets: Over 60k Bitcoin addresses linked to LockBit's operations have been exposed, potentially helping law enforcement to track financial transactions related to their ransom demands.
  • Negotiation Chats: Approximately 4.5k chats between LockBit and victims have been exposed, offering insights into their tactics and strategies.
  • Custom Ransomware Builds and Configurations: The database includes details on custom builds used by affiliates and encryption configurations, helping to understand the attack methods.
  • User Information: The leak includes a list of 75 admins and affiliates who had access to the panel, potentially revealing identities or critical intelligence for law enforcement.
  1. The cryptocurrency transactions related to LockBit's ransom operations might be traced due to the exposure of over 59,000 Bitcoin addresses.
  2. The breach of LockBit's panel has revealed nearly 4,500 chats between the ransomware group and their victims, offering insights into their extortion tactics.
  3. Although LockBit claims no private keys were exposed, the incident has potentially unveiled a wealth of information about their operations that could aid authorities in identifying group members and tracking their financial activities.
  4. The recent hack on LockBit has reportedly impacted their operations, with potential infrastructure disruptions and a decreased ability to coordinate attacks and communicate with affiliates.
  5. The breach has also led to the exposure of sensitive data, including the passwords of 75 LockBit admins and affiliates, some examples being "Weekendlover69" and "LockbitProud231."

Read also:

    Latest