Seems like #LockBit3 torrent server are (surprisingly) still active.
Check Rakesh Krishnan's Daily Hunt (here: github.com/TheRavenFile...)
#Repost
🆕 🇮🇹 via, @ransomnews.online
🏴☠️ Gruppo: #lockbit3 | Rivendicazione attacco informatico
🗒️ 56° attacco #Ransomware del 2025 (14° nel mese di Aprile)
Cc/ @gpdp.it | @garantepiracy.it
🚨 nuovo attacco #ransomware Italia 🚨
🏴☠️ gruppo #LockBit3
⚙️ Tutto per l'Ufficio SRL | Massa
🔗 tuttoperlufficio.eu
📄 sample: -
▪️ dati esfiltrati dichiarati: -
▪️ dati esfiltrati pubblicati: -
⏲️ scadenza: 05 maggio 2025
#ransomNews #security #infosec
Un dettaglio importante: la stessa azienda era già finita nel mirino di #LockBit3 nel mese di marzo. Secondo quanto comunicato dal gruppo, i dati rubati (47.00GB) sarebbero dovuti essere pubblicati il 15 aprile.
Tuttavia, ad oggi, nessun dato è stato effettivamente diffuso.
Threat actor #Babuk2 disclosed a list of recent victims they would attack, including #Amazon.
However, many of those victims have already been attacked by other groups such as #LockBit3 and #CL0P^_
We're working on an analytical profile of the apolitical and money-driven group Babuk, stay tuned!
🆕 🇮🇹
#Lockbit3: 24° attacco #Ransomware del 2025 (1° nel mese di Marzo)
▪️ Cogesi S.R.L. | Guidonia Montecelio (RM)
🔗 gruppocogesi.it
▪️ Sample pubblicati: ==
▪️ Dati esfiltrati dichiarati: ==
▪️ Dati esfiltrati pubblicati: ==
#Ransomware Allied Tenesis
#Lynx group claims this company, but the real name is Allied Telesis. This may be a typo.
It's evident from the image and the description.
800 GB claimed.
The same target was claimed by #lockbit3 in May 2024
🔗 ransomfeed.it/index.php?pa...
🆕 RedACT - Ransomware Disclosure & Activity Tracking 🇮🇹
#Lockbit3: 14° attacco #Ransomware del 2025 (2° nel mese di Febbraio)
▪️ Gruppo Zaccaria | EdilZeta S.P.A. | gruppozaccaria.it | Modica (RG)
▪️ Sample pubblicati: ==
▪️ Dati esfiltrati dichiarati: ==
▪️ Dati esfiltrati pubblicati: ==
𝗔𝗰𝘁𝗼𝗿: #lockbit3
𝗩𝗶𝗰𝘁𝗶𝗺: Yesmoke SRL | yesmoke.eu
𝗖𝗼𝘂𝗻𝘁𝗿𝘆: Italy 🇮🇹
𝗦𝗮𝗺𝗽𝗹𝗲: no
𝗘𝘅𝗳𝗶𝗹𝘁𝗿𝗮𝘁𝗲𝗱 𝗱𝗮𝘁𝗮: -
𝗗𝗲𝗮𝗱𝗹𝗶𝗻𝗲: October 2, 2024
🔗 ransomfeed.it/index.php?pa...
#ransomfeed #security #infosec
More about #lockbit3 and their claims, in an article by Daniel Croft for Cyber Daily Australia 🇦🇺
🔗 www.cyberdaily.au/security/110...
>>>
🚨 UPDATE #lockbit3
About the claims recently published by lockbit, we must point out that the majority of those belong to #ransomhub.
Since Operation Cronos, lockbit3 has close tied with many groups; on its channels continues to publish samples and materials belonging to its affiliates.
>>>
#lockbit3 latest claim was about the Federal Reserve. It's always in the eyes of the beholder.
Here: ransomfeed.it/index.php?pa...
𝗔𝗰𝘁𝗼𝗿: #lockbit3
𝗩𝗶𝗰𝘁𝗶𝗺: Università di Siena | unisi.it
𝗖𝗼𝘂𝗻𝘁𝗿𝘆: Italy 🇮🇹
𝗦𝗮𝗺𝗽𝗹𝗲: yes
𝗘𝘅𝗳𝗶𝗹𝘁𝗿𝗮𝘁𝗲𝗱 𝗱𝗮𝘁𝗮: 514GB
𝗗𝗲𝗮𝗱𝗹𝗶𝗻𝗲: May 27, 2024
🔗 ransomfeed.it/index.php?pa...
#ransomfeed #security #infosec
🚨 UPDATE
After #CSIRTItalia and #ACN announced they have recovered all systems, threat actor #lockbit3 listed Università di Siena as their victim.
#lockbit3 has listed multiple ransomware gangs as affiliates: qlin, blacksuit, play, blackbasta, dragonforce, apt73, monti, fsociety, cl0p, bianlian, danon, incransom.
We may argue, after many law enforcement proceedings, some of the criminal organizations decided to stand in a joint row.
#lockbit3 still disclosing many other claims, on private channels, including Italian FAAC Group.
However, FAAC's claim is dated July 2022, so it should not be considered new.
At the time, 19.4GB of data (contracts, documents, and references) were exfiltrated.
👉🏻 ransomfeed.it/index.php?pa...
May in review for #LOCKBIT3:
👉🏻 131 total new claims
👉🏻 38 countries involved
👉🏻 91 post-sanctions claims
With 370 claims in 2024, lockbit is the most active group in the ransomware scene. Tho, someone stated they were in decline.
🔗 ransomfeed.it/stats.php?pa...
🔗 ransomfeed.it/stats.php?pa...
𝗔𝗰𝘁𝗼𝗿: #lockbit3
𝗩𝗶𝗰𝘁𝗶𝗺: Interfashion Intermoda SPA | interfashion.it
𝗖𝗼𝘂𝗻𝘁𝗿𝘆: Italy 🇮🇹
𝗦𝗮𝗺𝗽𝗹𝗲: no
𝗘𝘅𝗳𝗶𝗹𝘁𝗿𝗮𝘁𝗲𝗱 𝗱𝗮𝘁𝗮: -
𝗗𝗲𝗮𝗱𝗹𝗶𝗻𝗲: May 16, 2024
🔗 ransomfeed.it/index.php?pa...
#ransomfeed #security #infosec
𝗔𝗰𝘁𝗼𝗿: #lockbit3
𝗩𝗶𝗰𝘁𝗶𝗺: Orsini Group Divisione Imballaggi | orsiniimballaggi.com
𝗖𝗼𝘂𝗻𝘁𝗿𝘆: Italy 🇮🇹
𝗦𝗮𝗺𝗽𝗹𝗲: yes
𝗘𝘅𝗳𝗶𝗹𝘁𝗿𝗮𝘁𝗲𝗱 𝗱𝗮𝘁𝗮: -
𝗗𝗲𝗮𝗱𝗹𝗶𝗻𝗲: May 16, 2024
🔗 ransomfeed.it/index.php?pa...
#ransomfeed #security #infosec
𝗔𝗰𝘁𝗼𝗿: #lockbit3
𝗩𝗶𝗰𝘁𝗶𝗺: Randi Group Villa Pana SPA | randi-group.com
𝗖𝗼𝘂𝗻𝘁𝗿𝘆: Italy 🇮🇹
𝗦𝗮𝗺𝗽𝗹𝗲: yes
𝗘𝘅𝗳𝗶𝗹𝘁𝗿𝗮𝘁𝗲𝗱 𝗱𝗮𝘁𝗮: -
𝗗𝗲𝗮𝗱𝗹𝗶𝗻𝗲: May 16, 2024
🔗 ransomfeed.it/index.php?pa...
#ransomfeed #security #infosec
𝗔𝗰𝘁𝗼𝗿: #lockbit3
𝗩𝗶𝗰𝘁𝗶𝗺: Agencavi Systems SRL | agencavisystems.com
𝗖𝗼𝘂𝗻𝘁𝗿𝘆: Italy 🇮🇹
𝗦𝗮𝗺𝗽𝗹𝗲: yes
𝗘𝘅𝗳𝗶𝗹𝘁𝗿𝗮𝘁𝗲𝗱 𝗱𝗮𝘁𝗮: -
𝗗𝗲𝗮𝗱𝗹𝗶𝗻𝗲: May 16, 2024
🔗 ransomfeed.it/index.php?pa...
#ransomfeed #ransomware #security #infosec
𝗔𝗰𝘁𝗼𝗿: #lockbit3
𝗩𝗶𝗰𝘁𝗶𝗺: gammaRenax AG | gammarenax.ch
𝗖𝗼𝘂𝗻𝘁𝗿𝘆: Swittzerland 🇨🇭
𝗦𝗮𝗺𝗽𝗹𝗲: no
𝗘𝘅𝗳𝗶𝗹𝘁𝗿𝗮𝘁𝗲𝗱 𝗱𝗮𝘁𝗮: -
𝗗𝗲𝗮𝗱𝗹𝗶𝗻𝗲: May 21, 2024
🔗 ransomfeed.it/index.php?pa...
#ransomfeed #ransomware #security #infosec
♻️ rebranded group: APT73
Rebranded from Eraleig, a spin-off of #Lockbit3.
#ransomfeed #security #infosec #ransomware
𝗔𝗰𝘁𝗼𝗿: #lockbit3
𝗩𝗶𝗰𝘁𝗶𝗺: Studio Galbusera Commercialisti Associati
𝗖𝗼𝘂𝗻𝘁𝗿𝘆: Italy 🇮🇹
𝗦𝗮𝗺𝗽𝗹𝗲: yes
🔗 ransomfeed.it/index.php?pa...
@signorina37.rfeed.it
🚨 KSA Architecture
🌍 ransomfeed.it/index.php?pa...
1.5TB of data have been stolen from KSA Architecture; a strong threat to employees stands on the site page, which is a new pattern for #Lockbit3.
𝗔𝗰𝘁𝗼𝗿: #lockbit3
𝗩𝗶𝗰𝘁𝗶𝗺: Logtainer SRL | logtainer.com
𝗖𝗼𝘂𝗻𝘁𝗿𝘆: Italy 🇮🇹
𝗦𝗮𝗺𝗽𝗹𝗲: no
Logistics excellence and private operator operating and moving container trains on the Italian rail network.
🔗 ransomfeed.it/index.php?pa...
𝗔𝗰𝘁𝗼𝗿: #lockbit3
𝗩𝗶𝗰𝘁𝗶𝗺: Philogen SPA | philogen.com
𝗖𝗼𝘂𝗻𝘁𝗿𝘆: Italy 🇮🇹
𝗦𝗮𝗺𝗽𝗹𝗲: no
Italian-Swiss biotechnology company striving to innovate the treatment of cancer and other serious conditions.
🔗 ransomfeed.it/index.php?pa...
𝗧𝘆𝗽𝗲: ransomware
𝗧𝗮𝗿𝗴𝗲𝘁: Switzerland 🇨🇭
𝗩𝗶𝗰𝘁𝗶𝗺: Avesco Rent SA | avescorent.ch
𝗔𝗰𝘁𝗼𝗿: #Lockbit3
𝗦𝗮𝗺𝗽𝗹𝗲: yes
🔗 ransomfeed.it/index.php?pa...
@sonoclaudio.rfeed.it @signorina37.rfeed.it @nuke86.rfeed.it @edoardolimone.bsky.social