The ransomware group LockBit advised officers with Fulton County, Ga. they may anticipate to see their inside paperwork revealed on-line this morning until the county paid a ransom demand. LockBit eliminated Fulton County’s itemizing from its sufferer shaming web site this morning, claiming the county had paid. However county officers stated they didn’t pay, nor did anybody make fee on their behalf. Safety consultants say LockBit was doubtless bluffing and doubtless misplaced many of the knowledge when the gang’s servers had been seized this month by U.S. and U.Ok. legislation enforcement.
LockBit listed Fulton County as a sufferer on Feb. 13, saying that until it was paid a ransom the group would publish information stolen in a breach on the county final month. That assault disrupted county telephones, Web entry and even their court docket system. LockBit leaked a small variety of the county’s information as a teaser, which appeared to incorporate delicate and sealed court docket information in present and previous legal trials.
On Feb. 16, Fulton County’s entry — together with a countdown timer till the information could be revealed — was faraway from the LockBit web site with out rationalization. The chief of LockBit advised KrebsOnSecurity this was as a result of Fulton County officers had engaged in last-minute negotiations with the group.
However on Feb. 19, investigators with the FBI and the U.Ok.’s Nationwide Crime Company (NCA) took over LockBit’s online infrastructure, changing the group’s homepage with a seizure discover and hyperlinks to LockBit ransomware decryption instruments.
In a press briefing on Feb. 20, Fulton County Fee Chairman Robb Pitts advised reporters the county didn’t pay a ransom demand, noting that the board “couldn’t in good conscience use Fulton County taxpayer funds to make a fee.”
Three days later, LockBit reemerged with new domains on the dark web, and with Fulton County listed amongst a half-dozen different victims whose knowledge was about to be leaked in the event that they refused to pay. Because it does with all victims, LockBit assigned Fulton County a countdown timer, saying officers had till late within the night on March 1 till their knowledge was revealed.
LockBit quickly moved up the deadline to the morning of Feb. 29. As Fulton County’s LockBit timer was counting all the way down to zero this morning, its itemizing disappeared from LockBit’s website. LockBit’s chief and spokesperson, who goes by the deal with “LockBitSupp,” advised KrebsOnSecurity at the moment that Fulton County’s knowledge disappeared from their website as a result of county officers paid a ransom.
“Fulton paid,” LockBitSupp stated. When requested for proof of fee, LockBitSupp claimed. “The proof is that we deleted their knowledge and didn’t publish it.”
However at a press convention at the moment, Fulton County Chairman Robb Pitts stated the county doesn’t know why its knowledge was faraway from LockBit’s website.
“As I stand right here at 4:08 p.m., we aren’t conscious of any knowledge being launched at the moment to date,” Pitts stated. “That doesn’t imply the risk is over. They may launch no matter knowledge they’ve at any time. Now we have no management over that. Now we have not paid any ransom. Nor has any ransom been paid on our behalf.”
Brett Callow, a risk analyst with the safety agency Emsisoft, stated LockBit doubtless misplaced all the sufferer knowledge it stole earlier than the FBI/NCA seizure, and that it has been attempting madly since then to avoid wasting face inside the cybercrime group.
“I believe it was a case of them attempting to persuade their associates that they had been nonetheless in fine condition,” Callow stated of LockBit’s latest actions. “I strongly suspect this would be the finish of the LockBit model.”
Others have come to an analogous conclusion. The safety agency RedSense posted an evaluation to Twitter/X that after the takedown, LockBit revealed a number of “new” sufferer profiles for corporations that it had listed weeks earlier on its sufferer shaming website. These sufferer companies — a healthcare supplier and main securities lending platform — additionally had been unceremoniously faraway from LockBit’s new shaming web site, regardless of LockBit claiming their knowledge could be leaked.
“We’re 99% certain the remainder of their ‘new victims’ are additionally faux claims (outdated knowledge for brand new breaches),” RedSense posted. “So the most effective factor for them to do could be to delete all different entries from their weblog and cease defrauding sincere folks.”
Callow stated there definitely have been loads of circumstances prior to now the place ransomware gangs exaggerated their plunder from a sufferer group. However this time feels completely different, he stated.
“It’s a bit uncommon,” Callow stated. “That is about attempting to nonetheless associates’ nerves, and saying, ‘All is properly, we weren’t as badly compromised as legislation enforcement instructed.’ However I believe you’d should be a idiot to work with a corporation that has been so completely hacked as LockBit has.”