cyberplace.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Cybersecurity, fandom, video games, technology, dog photos and most importantly, you.

Server stats:

961
active users

HT to @brett, apparently LockBit 3.0’s site has been seized by the NCA.

If real, the NCA should note the leaked data, file share and private note servers and portals are still online.

This is the other key one the NCA should seize, still online.

LockBit are offline on instant messaging, y'all will be surprised to know.

LockBit still have infrastructure online, which is still counting up in terms of uptime.

It's pretty mind boggling to me that for 4 years 170 days, these guys have been doing horse carriage robbery of schools and hospitals and.. uh... they just did it.

(Also, yes, they have a bug bounty that pays better than most large orgs).

Kevin Beaumont

Just to be super clear, 3 different LockBit services are still online:

lockbit7z2jwcskxpbokpemdxmltip
lockbitfile2tcudkcqqt2ve6btssy
lockbitnotexk2vnf2q2zwjefsl3hj

The first one is still serving stolen data, so if law enforcement have taken control of the infrastructure they definitely need to shut that one down.

The last (?) listed LockBit 3.0 victim org.

Okay, the NCA did a 10/10 job with the trolling of LockBit here.

LockBit's poor security

So there's loads more to come on the LockBit takedown, including new info on how they exfiltrate data and such.

One extra bit of info - even after companies paid the ransom, LockBit were keeping the data - it was on the servers the NCA seized.

All the companies who told the ICO and EU regulators their data had been “secured” after paying ransomware groups

@GossiTheDog@cyberplace.social Separate infra maybe? I guess we'll see what gets said tomorrow in the AM.

@GossiTheDog Apparently, the FBI has breached only servers running PHP - probably via some kind of vulnerability.

@GossiTheDog so i wonder how long it'll take before ransomware groups start setting up dead mans switches

@GossiTheDog I just wonder if any of the affected orgs are otherwise under investigation and if getting these dumps *not from the companies themselves* is legal for the investigators...... And if the info would be admissible, only relevant to show where admissible copies could be found, or considered poisoned.

@GossiTheDog Wait, they are not IEC 27001:2022 compliant?

@GossiTheDog One of your screenshots actually leak the Onion URL to one of their servers.

Login has been disabled by the authorities so any login actually works.

Plus the login field is vulnerable to XSS 😂

@GossiTheDog aww man, does this mean cyber is secure now? Do I have to find a new job? 😂🤣