shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

271
active users

#LockBit

0 posts0 participants0 posts today
ESET Research<p>The <a href="https://infosec.exchange/tags/FBI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FBI</span></a> and <a href="https://infosec.exchange/tags/DCIS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DCIS</span></a> disrupted <a href="https://infosec.exchange/tags/Danabot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Danabot</span></a>. <a href="https://infosec.exchange/tags/ESET" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ESET</span></a> was one of several companies that cooperated in this effort. <a href="https://www.welivesecurity.com/en/eset-research/danabot-analyzing-fallen-empire/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">welivesecurity.com/en/eset-res</span><span class="invisible">earch/danabot-analyzing-fallen-empire/</span></a><br><a href="https://infosec.exchange/tags/ESETresearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ESETresearch</span></a> has been involved in this operation since 2018. Our contribution included providing technical analyses of the malware and its backend infrastructure, as well as identifying Danabot’s C&amp;C servers. Danabot is a <a href="https://infosec.exchange/tags/MaaS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MaaS</span></a> <a href="https://infosec.exchange/tags/infostealer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infostealer</span></a> that has also been seen pushing additional malware – even <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a>, such as <a href="https://infosec.exchange/tags/LockBit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LockBit</span></a>, <a href="https://infosec.exchange/tags/Buran" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Buran</span></a>, and <a href="https://infosec.exchange/tags/Crisis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Crisis</span></a> – to compromised systems. <br>We have analyzed Danabot campaigns all around the world and found a substantial number of distinct samples of the malware, as well as identified more than 1,000 C&amp;Cs. <br>This infostealer is frequently promoted on underground forums. The affiliates are offered an administration panel application, a backconnect tool for real-time control of bots, and a proxy server application that relays the communication between the bots and the C&amp;C server. <br>IoCs are available in our GitHub repo. You can expect updates with more details in the coming days. <a href="https://github.com/eset/malware-ioc/tree/master/danabot" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/eset/malware-ioc/tr</span><span class="invisible">ee/master/danabot</span></a></p>
Xavier «X» Santolaria :verified_paw: :donor:<p>🔥 Latest issue of my curated <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> and <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> list of resources for week #19/2025 is out!</p><p>It includes the following and much more:</p><p>💬 The <a href="https://infosec.exchange/tags/Signal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Signal</span></a> clone the Trump admin uses was hacked;</p><p>🇺🇸 ✈️ ICE's airline hacked;</p><p>🇬🇧 The DragonForce <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> group claimed responsibility for recent cyberattacks on UK retailers;</p><p>🌐 NATO hosting the Locked Shields 2025 cyber defense exercise in Estonia;</p><p>🔓 The <a href="https://infosec.exchange/tags/LockBit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LockBit</span></a> ransomware gang was hacked!</p><p>📨 Subscribe to the <a href="https://infosec.exchange/tags/infosecMASHUP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecMASHUP</span></a> newsletter to have it piping hot in your inbox every week-end ⬇️</p><p><a href="https://infosec-mashup.santolaria.net/p/infosec-mashup-19-2025" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec-mashup.santolaria.net/</span><span class="invisible">p/infosec-mashup-19-2025</span></a></p>
Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:<p><a href="https://kolektiva.social/tags/LockBit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LockBit</span></a> ransomware gang has suffered a data breach after its dark web affiliate panels were defaced and replaced with a message linking to a MySQL database dump. <a href="https://kolektiva.social/tags/ransomwaregroup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomwaregroup</span></a> <a href="https://kolektiva.social/tags/dataleaking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataleaking</span></a> <a href="https://www.bleepingcomputer.com/news/security/lockbit-ransomware-gang-hacked-victim-negotiations-exposed/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/lockbit-ransomware-gang-hacked-victim-negotiations-exposed/</span></a></p>
Karl Emil Nikka<p>Ransomware group Lockbit’s new website. The only thing missing is a picture of Mr. Mackey, m’kay.</p><p><a href="https://social.nikkasystems.com/tags/Lockbit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Lockbit</span></a></p>
ESET Research<p><a href="https://infosec.exchange/tags/ESETresearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ESETresearch</span></a> discovered previously unknown links between the <a href="https://infosec.exchange/tags/RansomHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RansomHub</span></a>, <a href="https://infosec.exchange/tags/Medusa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Medusa</span></a>, <a href="https://infosec.exchange/tags/BianLian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BianLian</span></a>, and <a href="https://infosec.exchange/tags/Play" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Play</span></a> ransomware gangs, and leveraged <a href="https://infosec.exchange/tags/EDRKillShifter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EDRKillShifter</span></a> to learn more about RansomHub’s affiliates. @SCrow357 <a href="https://www.welivesecurity.com/en/eset-research/shifting-sands-ransomhub-edrkillshifter/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">welivesecurity.com/en/eset-res</span><span class="invisible">earch/shifting-sands-ransomhub-edrkillshifter/</span></a> <br>RansomHub emerged in February 2024 and in just three months reached the top of the ransomware ladder, recruiting affiliates from disrupted <a href="https://infosec.exchange/tags/LockBit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LockBit</span></a> and <a href="https://infosec.exchange/tags/BlackCat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackCat</span></a>. Since then, it dominated the ransomware world, showing similar growth as LockBit once did. <br>Previously linked to North Korea-aligned group <a href="https://infosec.exchange/tags/Andariel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Andariel</span></a>, Play strictly denies operating as <a href="https://infosec.exchange/tags/RaaS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RaaS</span></a>. We found its members utilized RansomHub’s EDR killer EDRKillShifter, multiple times during their intrusions, meaning some members likely became RansomHub affiliates. <br>BianLian focuses on extortion-only attacks and does not publicly recruit new affiliates. Its access to EDRKillShifter suggests a similar approach as Play – having trusted members, who are not limited to working only with them.<br>Medusa, same as RansomHub, is a typical RaaS gang, actively recruiting new affiliates. Since it is common knowledge that affiliates of such RaaS groups often work for multiple operators, this connection is to be expected. <br>Our blogpost also emphasizes the growing threat of EDR killers. We observed an increase in the number of such tools, while the set of abused drivers remains quite small. Gangs such as RansomHub and <a href="https://infosec.exchange/tags/Embargo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Embargo</span></a> offer their killers as part of the affiliate program.<br>IoCs available on our GitHub: <a href="https://github.com/eset/malware-ioc/tree/master/ransomhub" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/eset/malware-ioc/tr</span><span class="invisible">ee/master/ransomhub</span></a></p>
Nonya Bidniss :CIAverified:<p>Russian cybercrime group sent a message of congratulations to Kash Patel and an offer. </p><p>...the Lockbit administrator then offered an “archive of classified information for you personally, Mr. Kash Patel.” This, it was claimed, contained information that could “not only negatively affect the reputation of the FBI, but destroy it as a structure.”<br><a href="https://infosec.exchange/tags/Lockbit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Lockbit</span></a> <a href="https://infosec.exchange/tags/FBI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FBI</span></a> <a href="https://www.forbes.com/sites/daveywinder/2025/02/26/this-data-could-destroy-the-fbi-russian-crime-gang-warns-kash-patel/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">forbes.com/sites/daveywinder/2</span><span class="invisible">025/02/26/this-data-could-destroy-the-fbi-russian-crime-gang-warns-kash-patel/</span></a></p>
Chuck Darwin<p>🆘 Trump administration retreats in fight against Russian cyber threats </p><p>The Trump administration has publicly and privately signaled that<br>🔥 it does not believe Russia represents a cyber threat against US national security or critical infrastructure, 🔥<br>marking a radical departure from longstanding intelligence assessments.</p><p>👉The shift in policy could make the US vulnerable to hacking attacks by Russia, experts warned, <br>and appeared to reflect the warming of relations between Donald Trump and Russia’s president, Vladimir Putin.<br>Two recent incidents indicate the US is no longer characterizing Russia as a cybersecurity threat.</p><p><a href="https://c.im/tags/Liesyl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Liesyl</span></a> <a href="https://c.im/tags/Franz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Franz</span></a>, deputy assistant secretary for international cybersecurity at the state department, <br>said in a speech last week before a United Nations working group on cybersecurity that <br>the US was concerned by threats perpetrated by some states but only named China and Iran, <br>with no mention of Russia in her remarks. </p><p>Franz also did not mention the Russia-based <a href="https://c.im/tags/LockBit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LockBit</span></a> <a href="https://c.im/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> group, <br>which the US has previously said is the most prolific ransomware group in the world and has been called out in UN forums in the past. </p><p>The treasury last year said LockBit operates on a ransomeware-as-service model, in which the group licenses its ransomware software to criminals in exchange for a portion of the paid ransoms.</p><p>In contrast to Franz’s statement, representatives for US allies in the European Union and the UK focused their remarks on the threat posed by Moscow, <br>with the UK pointing out that Russia was using offensive and malicious cyber-attacks against Ukraine alongside its illegal invasion.</p><p>💥“It’s incomprehensible to give a speech about threats in cyberspace and not mention Russia and it’s delusional to think this will turn Russia and the FSB [the Russian security agency] into our friends,” <br>said James Lewis, a veteran cyber expert formerly of the Center for Strategic and International Studies think tank in Washington.</p><p> “They hate the US and are still mad about losing the cold war. Pretending otherwise won’t change this.”<br>The US policy change has also been established behind closed doors.</p><p><a href="https://www.theguardian.com/us-news/2025/feb/28/trump-russia-hacking-cyber-security?CMP=Share_iOSApp_Other" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theguardian.com/us-news/2025/f</span><span class="invisible">eb/28/trump-russia-hacking-cyber-security?CMP=Share_iOSApp_Other</span></a></p>
Paul Shread<p>Despite global law enforcement actions and source code and decryption key leaks, LockBit is attempting a comeback with the release of LockBit 4.0 Ransomware-as-a-Service (RaaS).<br><a href="https://masto.ai/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://masto.ai/tags/LockBit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LockBit</span></a> <a href="https://masto.ai/tags/RaaS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RaaS</span></a> <a href="https://masto.ai/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://masto.ai/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://masto.ai/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> </p><p><a href="https://thecyberexpress.com/lockbit-ransomware-comeback-lockbit-4-0/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thecyberexpress.com/lockbit-ra</span><span class="invisible">nsomware-comeback-lockbit-4-0/</span></a></p>
John Leonard<p>No honour among ransomware thieves: affiliates' trust craters</p><p>Law enforcement action and exit scams have damaged the big gangs' brands</p><p><a href="https://www.computing.co.uk/news/4349590/honour-ransomware-thieves-affiliates-trust-craters" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">computing.co.uk/news/4349590/h</span><span class="invisible">onour-ransomware-thieves-affiliates-trust-craters</span></a></p><p><a href="https://mastodon.social/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://mastodon.social/tags/technews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technews</span></a> <a href="https://mastodon.social/tags/lockbit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lockbit</span></a> <a href="https://mastodon.social/tags/alphv" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>alphv</span></a></p>
Threat Insight<p>Proofpoint's Daniel Blackford is set to take the stage at Black Hat USA for a talk on law enforcement takedowns.</p><p><a href="https://infosec.exchange/tags/OperationEndgame" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OperationEndgame</span></a> is just one botnet disruption that has made recent headlines. <a href="https://infosec.exchange/tags/Emotet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Emotet</span></a>, <a href="https://infosec.exchange/tags/Qbot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Qbot</span></a>, <a href="https://infosec.exchange/tags/Lockbit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Lockbit</span></a>, and <a href="https://infosec.exchange/tags/Smokeloader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Smokeloader</span></a> are a few others.</p><p>Law enforcement cooperates on takedowns -- but are they effective? Be sure to catch Daniel's talk to examine the data!</p>
Matt Willemsen<p>Indonesia's communications minister faces pressure to resign following cyberattack<br><a href="https://therecord.media/indonesia-cyberattack-communications-minister-petition" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/indonesia-cybe</span><span class="invisible">rattack-communications-minister-petition</span></a> <a href="https://mastodon.social/tags/cyberattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattack</span></a> <a href="https://mastodon.social/tags/indonesia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>indonesia</span></a> <a href="https://mastodon.social/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://mastodon.social/tags/SAFEnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SAFEnet</span></a> <a href="https://mastodon.social/tags/BrainCipher" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BrainCipher</span></a> <a href="https://mastodon.social/tags/LockBit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LockBit</span></a></p>
Avoid the Hack! :donor:<p><a href="https://infosec.exchange/tags/LockBit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LockBit</span></a> lied: Stolen data is from a <a href="https://infosec.exchange/tags/bank" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bank</span></a>, not US Federal Reserve</p><p>Evolve Bank and Trust breached and ransomwared by LockBit. Personal information of both Evolve's retail customers and <a href="https://infosec.exchange/tags/FinTech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FinTech</span></a> partners' customers (but varies by individual):</p><p>- Name<br>- SSN<br>- DOB<br>- account information<br>- other (address, etc) information</p><p>Since <a href="https://infosec.exchange/tags/Evolve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Evolve</span></a> is a common/"friendly" bank partner for many FinTech companies, as stated previously this affects more than just direct/retail customers of Evolve.</p><p>Evolve is offering thoughts and prayers to customers (AKA free credit monitoring) and won't give further statement as of this time.</p><p><a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p><p><a href="https://www.bleepingcomputer.com/news/security/lockbit-lied-stolen-data-is-from-a-bank-not-us-federal-reserve/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/lockbit-lied-stolen-data-is-from-a-bank-not-us-federal-reserve/</span></a></p>
John Leonard<p>Surge in global ransomware attacks as LockBit returns</p><p>LockBit 3.0 resurfaces as leading threat actor</p><p><a href="https://www.computing.co.uk/news/4326058/surge-global-ransomware-attacks-lockbit-returns" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">computing.co.uk/news/4326058/s</span><span class="invisible">urge-global-ransomware-attacks-lockbit-returns</span></a></p><p><a href="https://mastodon.social/tags/lockbit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lockbit</span></a> <a href="https://mastodon.social/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/ncc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ncc</span></a> <a href="https://mastodon.social/tags/technews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technews</span></a></p>
Matt Willemsen<p>7,000 LockBit decryption keys now in the hands of the FBI, offering victims hope<br><a href="https://arstechnica.com/security/2024/06/fbi-urges-lockbit-victims-to-step-forward-after-seizing-7000-decryption-keys/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2024/</span><span class="invisible">06/fbi-urges-lockbit-victims-to-step-forward-after-seizing-7000-decryption-keys/</span></a> <a href="https://mastodon.social/tags/FBI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FBI</span></a> <a href="https://mastodon.social/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://mastodon.social/tags/victims" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>victims</span></a> <a href="https://mastodon.social/tags/LockBit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LockBit</span></a> <a href="https://mastodon.social/tags/decryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>decryption</span></a> <a href="https://mastodon.social/tags/keys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>keys</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/cryptocurrency" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptocurrency</span></a></p>
IT News<p>7,000 LockBit decryption keys now in the hands of the FBI, offering victims hope - Enlarge (credit: Getty Images) </p><p>The FBI is urging victims of on... - <a href="https://arstechnica.com/?p=2029593" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=2029593</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a> <a href="https://schleuss.online/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/lockbit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lockbit</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biz</span></a>&amp;it</p>
Brett Callow<p><a href="https://infosec.exchange/tags/LockBit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LockBit</span></a> has released what it claims is data related to <a href="https://infosec.exchange/tags/LondonDrugs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LondonDrugs</span></a>. <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a></p>
Brett Callow<p>Listed. Delisted. Relisted. <a href="https://infosec.exchange/tags/LondonDrugs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LondonDrugs</span></a> is back on <a href="https://infosec.exchange/tags/LockBit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LockBit</span></a>'s site. <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a></p>
Brett Callow<p><a href="https://infosec.exchange/tags/LockBit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LockBit</span></a> has listed London Drugs. <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/londondrugs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>londondrugs</span></a></p>
Brett Callow<p><a href="https://infosec.exchange/tags/LockBit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LockBit</span></a> has listed Township of Union Public Schools and Ewing Marion Kauffman School, the latter of which is in <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a>-battered Kansas City. </p><p>At least 42 <a href="https://infosec.exchange/tags/K12" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>K12</span></a> districts with a total of 368 schools have been impacted by <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> this year. Stats for 2023 in the link. 2/2</p><p><a href="https://www.emsisoft.com/en/blog/44987/the-state-of-ransomware-in-the-u-s-report-and-statistics-2023/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">emsisoft.com/en/blog/44987/the</span><span class="invisible">-state-of-ransomware-in-the-u-s-report-and-statistics-2023/</span></a></p>
Brett Callow<p><a href="https://infosec.exchange/tags/LockBit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LockBit</span></a> has listed Englewood Public School District and Pueblo County School District 70 <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/epsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>epsd</span></a> <a href="https://infosec.exchange/tags/pcsd70" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcsd70</span></a> </p><p><span class="h-card" translate="no"><a href="https://infosec.exchange/@douglevin" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>douglevin</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@PogoWasRight" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>PogoWasRight</span></a></span></p>