Advertisement · 728 × 90
#
Hashtag
#LockBit3
Advertisement · 728 × 90
Post image

Seems like #LockBit3 torrent server are (surprisingly) still active.

Check Rakesh Krishnan's Daily Hunt (here: github.com/TheRavenFile...)

3 0 0 0
Post image

Sono gli stessi che, ad aprile, avevano bucato #Everest.
In ogni caso, #Lockbit3 ha già "risposto".

4 0 0 0

#Repost
🆕 🇮🇹 via, @ransomnews.online
🏴‍☠️ Gruppo: #lockbit3 | Rivendicazione attacco informatico
🗒️ 56° attacco #Ransomware del 2025 (14° nel mese di Aprile)
Cc/ @gpdp.it | @garantepiracy.it

5 0 0 0
Post image

🚨 nuovo attacco #ransomware Italia 🚨

🏴‍☠️ gruppo #LockBit3
⚙️ Tutto per l'Ufficio SRL | Massa
🔗 tuttoperlufficio.eu
📄 sample: -
▪️ dati esfiltrati dichiarati: -
▪️ dati esfiltrati pubblicati: -
⏲️ scadenza: 05 maggio 2025

#ransomNews #security #infosec

2 0 0 1
Post image Post image

Un dettaglio importante: la stessa azienda era già finita nel mirino di #LockBit3 nel mese di marzo. Secondo quanto comunicato dal gruppo, i dati rubati (47.00GB) sarebbero dovuti essere pubblicati il 15 aprile.

Tuttavia, ad oggi, nessun dato è stato effettivamente diffuso.

3 0 1 0
Post image Post image

Threat actor #Babuk2 disclosed a list of recent victims they would attack, including #Amazon.

However, many of those victims have already been attacked by other groups such as #LockBit3 and #CL0P^_

We're working on an analytical profile of the apolitical and money-driven group Babuk, stay tuned!

3 0 0 0
Post image

🆕 🇮🇹
#Lockbit3: 24° attacco #Ransomware del 2025 (1° nel mese di Marzo)
▪️ Cogesi S.R.L. | Guidonia Montecelio (RM)
🔗 gruppocogesi.it
▪️ Sample pubblicati: ==
▪️ Dati esfiltrati dichiarati: ==
▪️ Dati esfiltrati pubblicati: ==

3 0 0 0
Post image

#Ransomware Allied Tenesis

#Lynx group claims this company, but the real name is Allied Telesis. This may be a typo.

It's evident from the image and the description.
800 GB claimed.

The same target was claimed by #lockbit3 in May 2024

🔗 ransomfeed.it/index.php?pa...

1 0 0 1
Post image

🆕 RedACT - Ransomware Disclosure & Activity Tracking 🇮🇹
#Lockbit3: 14° attacco #Ransomware del 2025 (2° nel mese di Febbraio)
▪️ Gruppo Zaccaria | EdilZeta S.P.A. | gruppozaccaria.it | Modica (RG)
▪️ Sample pubblicati: ==
▪️ Dati esfiltrati dichiarati: ==
▪️ Dati esfiltrati pubblicati: ==

3 2 0 0
Post image Post image

𝗔𝗰𝘁𝗼𝗿: #lockbit3
𝗩𝗶𝗰𝘁𝗶𝗺: Yesmoke SRL | yesmoke.eu
𝗖𝗼𝘂𝗻𝘁𝗿𝘆: Italy 🇮🇹
𝗦𝗮𝗺𝗽𝗹𝗲: no
𝗘𝘅𝗳𝗶𝗹𝘁𝗿𝗮𝘁𝗲𝗱 𝗱𝗮𝘁𝗮: -
𝗗𝗲𝗮𝗱𝗹𝗶𝗻𝗲: October 2, 2024

🔗 ransomfeed.it/index.php?pa...

#ransomfeed #security #infosec

1 0 0 1
Post image

More about #lockbit3 and their claims, in an article by Daniel Croft for Cyber Daily Australia 🇦🇺

🔗 www.cyberdaily.au/security/110...

>>>

1 0 1 1
Post image

🚨 UPDATE #lockbit3

About the claims recently published by lockbit, we must point out that the majority of those belong to #ransomhub.

Since Operation Cronos, lockbit3 has close tied with many groups; on its channels continues to publish samples and materials belonging to its affiliates.

>>>

0 0 1 0
Post image

#lockbit3 latest claim was about the Federal Reserve. It's always in the eyes of the beholder.

Here: ransomfeed.it/index.php?pa...

2 1 0 1
Post image

𝗔𝗰𝘁𝗼𝗿: #lockbit3
𝗩𝗶𝗰𝘁𝗶𝗺: Università di Siena | unisi.it
𝗖𝗼𝘂𝗻𝘁𝗿𝘆: Italy 🇮🇹
𝗦𝗮𝗺𝗽𝗹𝗲: yes
𝗘𝘅𝗳𝗶𝗹𝘁𝗿𝗮𝘁𝗲𝗱 𝗱𝗮𝘁𝗮: 514GB
𝗗𝗲𝗮𝗱𝗹𝗶𝗻𝗲: May 27, 2024

🔗 ransomfeed.it/index.php?pa...

#ransomfeed #security #infosec

1 0 0 0
Post image

🚨 UPDATE

After #CSIRTItalia and #ACN announced they have recovered all systems, threat actor #lockbit3 listed Università di Siena as their victim.

1 0 0 1
Post image

#lockbit3 has listed multiple ransomware gangs as affiliates: qlin, blacksuit, play, blackbasta, dragonforce, apt73, monti, fsociety, cl0p, bianlian, danon, incransom.

We may argue, after many law enforcement proceedings, some of the criminal organizations decided to stand in a joint row.

2 0 0 1
Post image

#lockbit3 still disclosing many other claims, on private channels, including Italian FAAC Group.

However, FAAC's claim is dated July 2022, so it should not be considered new.

At the time, 19.4GB of data (contracts, documents, and references) were exfiltrated.

👉🏻 ransomfeed.it/index.php?pa...

1 0 0 1
Post image

May in review for #LOCKBIT3:

👉🏻 131 total new claims
👉🏻 38 countries involved
👉🏻 91 post-sanctions claims

With 370 claims in 2024, lockbit is the most active group in the ransomware scene. Tho, someone stated they were in decline.

🔗 ransomfeed.it/stats.php?pa...
🔗 ransomfeed.it/stats.php?pa...

0 0 0 0
Post image

𝗔𝗰𝘁𝗼𝗿: #lockbit3
𝗩𝗶𝗰𝘁𝗶𝗺: Interfashion Intermoda SPA | interfashion.it
𝗖𝗼𝘂𝗻𝘁𝗿𝘆: Italy 🇮🇹
𝗦𝗮𝗺𝗽𝗹𝗲: no
𝗘𝘅𝗳𝗶𝗹𝘁𝗿𝗮𝘁𝗲𝗱 𝗱𝗮𝘁𝗮: -
𝗗𝗲𝗮𝗱𝗹𝗶𝗻𝗲: May 16, 2024

🔗 ransomfeed.it/index.php?pa...

#ransomfeed #security #infosec

0 0 0 0
Post image

𝗔𝗰𝘁𝗼𝗿: #lockbit3
𝗩𝗶𝗰𝘁𝗶𝗺: Orsini Group Divisione Imballaggi | orsiniimballaggi.com
𝗖𝗼𝘂𝗻𝘁𝗿𝘆: Italy 🇮🇹
𝗦𝗮𝗺𝗽𝗹𝗲: yes
𝗘𝘅𝗳𝗶𝗹𝘁𝗿𝗮𝘁𝗲𝗱 𝗱𝗮𝘁𝗮: -
𝗗𝗲𝗮𝗱𝗹𝗶𝗻𝗲: May 16, 2024

🔗 ransomfeed.it/index.php?pa...

#ransomfeed #security #infosec

0 0 0 0
Post image

𝗔𝗰𝘁𝗼𝗿: #lockbit3
𝗩𝗶𝗰𝘁𝗶𝗺: Randi Group Villa Pana SPA | randi-group.com
𝗖𝗼𝘂𝗻𝘁𝗿𝘆: Italy 🇮🇹
𝗦𝗮𝗺𝗽𝗹𝗲: yes
𝗘𝘅𝗳𝗶𝗹𝘁𝗿𝗮𝘁𝗲𝗱 𝗱𝗮𝘁𝗮: -
𝗗𝗲𝗮𝗱𝗹𝗶𝗻𝗲: May 16, 2024

🔗 ransomfeed.it/index.php?pa...

#ransomfeed #security #infosec

0 0 0 0
Post image

𝗔𝗰𝘁𝗼𝗿: #lockbit3
𝗩𝗶𝗰𝘁𝗶𝗺: Agencavi Systems SRL | agencavisystems.com
𝗖𝗼𝘂𝗻𝘁𝗿𝘆: Italy 🇮🇹
𝗦𝗮𝗺𝗽𝗹𝗲: yes
𝗘𝘅𝗳𝗶𝗹𝘁𝗿𝗮𝘁𝗲𝗱 𝗱𝗮𝘁𝗮: -
𝗗𝗲𝗮𝗱𝗹𝗶𝗻𝗲: May 16, 2024

🔗 ransomfeed.it/index.php?pa...

#ransomfeed #ransomware #security #infosec

0 0 0 0
Post image

𝗔𝗰𝘁𝗼𝗿: #lockbit3
𝗩𝗶𝗰𝘁𝗶𝗺: gammaRenax AG | gammarenax.ch
𝗖𝗼𝘂𝗻𝘁𝗿𝘆: Swittzerland 🇨🇭
𝗦𝗮𝗺𝗽𝗹𝗲: no
𝗘𝘅𝗳𝗶𝗹𝘁𝗿𝗮𝘁𝗲𝗱 𝗱𝗮𝘁𝗮: -
𝗗𝗲𝗮𝗱𝗹𝗶𝗻𝗲: May 21, 2024

🔗 ransomfeed.it/index.php?pa...

#ransomfeed #ransomware #security #infosec

0 0 0 0
Post image

♻️ rebranded group: APT73

Rebranded from Eraleig, a spin-off of #Lockbit3.

#ransomfeed #security #infosec #ransomware

0 0 0 0
Post image

𝗔𝗰𝘁𝗼𝗿: #lockbit3
𝗩𝗶𝗰𝘁𝗶𝗺: Studio Galbusera Commercialisti Associati
𝗖𝗼𝘂𝗻𝘁𝗿𝘆: Italy 🇮🇹
𝗦𝗮𝗺𝗽𝗹𝗲: yes

🔗 ransomfeed.it/index.php?pa...

@signorina37.rfeed.it

1 0 0 2
Post image Post image Post image

🚨 KSA Architecture
🌍 ransomfeed.it/index.php?pa...

1.5TB of data have been stolen from KSA Architecture; a strong threat to employees stands on the site page, which is a new pattern for #Lockbit3.

1 0 0 1
Post image

𝗔𝗰𝘁𝗼𝗿: #lockbit3
𝗩𝗶𝗰𝘁𝗶𝗺: Logtainer SRL | logtainer.com
𝗖𝗼𝘂𝗻𝘁𝗿𝘆: Italy 🇮🇹
𝗦𝗮𝗺𝗽𝗹𝗲: no

Logistics excellence and private operator operating and moving container trains on the Italian rail network.

🔗 ransomfeed.it/index.php?pa...

0 0 0 0
Post image

𝗔𝗰𝘁𝗼𝗿: #lockbit3
𝗩𝗶𝗰𝘁𝗶𝗺: Philogen SPA | philogen.com
𝗖𝗼𝘂𝗻𝘁𝗿𝘆: Italy 🇮🇹
𝗦𝗮𝗺𝗽𝗹𝗲: no

Italian-Swiss biotechnology company striving to innovate the treatment of cancer and other serious conditions.

🔗 ransomfeed.it/index.php?pa...

0 0 0 0
Post image

𝗧𝘆𝗽𝗲: ransomware
𝗧𝗮𝗿𝗴𝗲𝘁: Switzerland 🇨🇭
𝗩𝗶𝗰𝘁𝗶𝗺: Avesco Rent SA | avescorent.ch
𝗔𝗰𝘁𝗼𝗿: #Lockbit3
𝗦𝗮𝗺𝗽𝗹𝗲: yes

🔗 ransomfeed.it/index.php?pa...

@sonoclaudio.rfeed.it @signorina37.rfeed.it @nuke86.rfeed.it @edoardolimone.bsky.social

2 1 0 0