LockBit Strikes Back: How Cybercrime Resilience Foiled Law Enforcement

Operation Cronos took down LockBit, but like a bad movie villain, they bounced back in a week. Despite law enforcement’s best efforts, the ransomware gang’s resilience shows that backups aren’t just for the good guys. Malware groups are adopting enterprise best practices—who knew cybercrime could…

Hot Take:

Law enforcement agencies might have taken down LockBit, BlackCat, and Qakbot, but these cybercriminals are like the world’s worst weeds—no matter how much you spray, they keep coming back! It’s like playing whack-a-mole, but with a blindfold on and the moles have PhDs in network engineering.

Key Points:

  • Operation Cronos seized LockBit’s attack infrastructure, but the ransomware gang resurfaced within a week.
  • Law enforcement agencies exploited the same vulnerabilities that LockBit often used.
  • BlackCat/ALPHV reappeared two months after a major takedown, making $22 million in ransomware payments.
  • Qakbot botnet was dismantled but quickly reemerged, continuing to distribute various ransomware strains.
  • Cybercriminals are adopting best practices, including backups and contingency plans, making them resilient to takedowns.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here