Categories: Technology

Lockbit ransomware gang creates first malicious bug bounty program

[ad_1]

We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 – 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!


Today, the Lockbit ransomware gang announced the launch of Lockbit 3.0, a new ransomware-as-a-service offering and a bug bounty program. 

According to Lockbit’s leak site, as part of the bug bounty program, the cyber gang will pay all security researchers, ethical and unethical hackers” to provide Personally Identifiable Information (PII) on high-profile individuals and web exploits in exchange for remuneration ranging from $1,000 to $1 million.  

The development comes shortly after the notorious Conti ransomware group disbanded, and as Lockbit is becoming one of the most prolific ransomware gangs in operation, accounting for almost half of all known ransomware attacks in May 2022. 

What a malicious bug bounty program means for the threat landscape 

Lockbit’s malicious inversion of the concept of legitimate bug bounty programs popularized by providers like Bugcrowd and HackerOne, which incentivize security researchers to identify vulnerabilities so they can be fixed, highlights how malicious threats are evolving.

“With the fall of the Conti ransomware group, LockBit has positioned itself as the top ransomware group operating today based on its volume of attacks in recent months. The release of LockBit 3.0 with the introduction of a bug bounty program is a formal invitation to cybercriminals to help assist the group in its quest to remain at the top,” said Senior Staff Research Engineer at Tenable, Satnam Narang. 

For LockBit, enlisting the help of researchers and criminals across the dark web has the potential not only to identify potential targets, but to secure its leak sites against law enforcement. 

“A key focus of the bug bounty program are defensive measures: preventing security researchers and law enforcement from finding bugs in its leak sites or ransomware, identifying ways that members including the affiliate program boss could be doxed, as well as funding bugs within the messaging software used by the group for internal communications and the Tor network itself,” Narang said. 

The writing on the wall is that Lockbit’s adversarial approach is about to get much more sophisticated.  “Anyone that still doubts cybercriminal gangs have reached a level of maturity that rivals the organizations they target may need to reassess,” said Senior Technical Engineer at Vulcan Cyber, Mike Parkin.

What about the potential drawbacks for Lockbit?

While seeking external support has the potential to enhance Lockbit’s operations, others are skeptical that other threat actors will participate in sharing information that they could exploit to gain entry to target organizations. 

At the same time, many legitimate researchers may double their efforts to find vulnerabilities in the group’s leak site. 

“This development is different, however, I doubt they will get many takers. I know that if I find a vulnerability, I’m using it to put them in prison. If a criminal finds one, it’ll be to steal from them because there is no honor among ransomware operators,” said Principal Threat Hunter at Netenrich, John Bambenek. 

How can organizations respond?

If threat actors do engage in sharing information with Lockbit in exchange for a reward, organizations need to be much more proactive about mitigating risks in their environment.  

At the very least, security leaders should assume that any individuals with knowledge of vulnerabilities in the software supply chain will be tempted to share them with the group. 

“This should have every enterprise looking at the security of their internal supply chain, including who and what has access to their code, and any secrets in it. Unethical bounty programs like this turn passwords and keys in code into gold for everybody who has access to your code,” said Head of Product and Developer Enablement at BluBracket, Casey Bisson.
Over the next few weeks, vulnerability management should be a top priority, making sure that there are no potential entry points in internal or external facing assets that potential attackers could exploit.

VentureBeat’s mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Learn more about membership.

[ad_2]
Source link
Admin

Recent Posts

Air India: A Journey Through Time

Hey there! Ready to embark on a historical journey with Air India? Whether you're a…

1 week ago

The Rise of Smart Altcoins: How 2025 Is Reshaping the Crypto Hierarchy

In 2017, altcoins were seen as experimental side projects to Bitcoin. By 2021, they became…

3 weeks ago

5 Services That Can Transform Your Shopping Center in Las Vegas into a Must-Visit Destination

Shopping centers in Las Vegas have a unique opportunity to stand out by offering not…

3 weeks ago

Levitra Dosage: Guidelines for Safe Use

Levitra, a widely recognized medication for treating erectile dysfunction (ED), has proven to be a…

2 months ago

Practical Tips for Carpet Cleaning on a Budget

Have you ever looked down at your carpet and wondered if there’s a budget-friendly way…

2 months ago

The Best CSGO Case to Open in 2025: Top Picks for CS2 Skins

Counter-Strike 2 (CS2) has elevated the thrill of case openings, captivating both seasoned CS:GO veterans…

3 months ago