Article Details

Original Article Text

Click to Toggle View

LockBit ransomware now poaching BlackCat, NoEscape affiliates. The LockBit ransomware operation is now recruiting affiliates and developers from the BlackCat/ALPHV and NoEscape after recent disruptions and exit scams. Last week, the NoEscape and the BlackCat/ALPHV ransomware operation's Tor websites suddenly became inaccessible without warning. Affiliates associated with NoEscape claimed that the ransomware operators pulled an exit scam, stealing millions of dollars in ransom payments and shutting off the operation's web panels and data leak sites. NoEscape is believed to be a rebrand of the Avaddon ransomware operation, which shut down in June 201 and released their decryption keys to BleepingComputer. We hope that NoEscape will once again release the decryption keys for their victims now that they have shut down their operation. The BlackCat/ALPHV ransomware operation also suffered a 5-day disruption last week, with all their infrastructure going offline, including their data leak and negotiation sites. On Monday, the ALPHV data leak site returned, but with all data removed. While some negotiation URLs are working, many are not, effectively halting negotiations for those victims. The ALPHV admin claimed that their outage was caused by hardware failure. However, BleepingComputer heard from multiple sources that a law enforcement operation was related to the outage. The FBI declined to comment when we contacted them about the disruptions. Are you an ALPHV or NoEscape affiliate or someone with information about the outages? If you want to share the information, you can contact us securely on Signal at +1 (646) 961-3731, via email at tips@bleepingcomputer.com, or by using our tips form. LockBit recruits affiliates from distressed gangs As first reported by LeMagIT, LockBitSupp, the LockBit operation's manager, has begun to recruit affiliates from the BlackCat and NoEscape ransomware operations. In posts to a Russian-speaking hacking forum, LockBitSupp told affiliates that if they have backups of the stolen data, they could use his data leak site and negotiation panel to continue to extort victims.  In addition to affiliates, LockBitSupp is trying to recruit the coder for the ALPHV encryptor. While it is unclear if any of the BlackCat/NoEscape affiliates have moved over to LockBit, one BlackCat’s victim has already been spotted on LockBit’s data leak site. "LockBit ransomware group has added German Energy Agency dena (http://dena.de) to their victim list, which was previously a victim of ALPHV ransomware group," reads a tweet from FalconFeeds. BlackCat/ALPHV is a rebrand of the DarkSide and BlackMatter ransomware operations. After BlackMatter’s shutdown in November 2021, its affiliates transitioned to LockBit. With LockBit being the largest ransomware operation at this time, LockBitSupp told BleepingComputer that he viewed the BlackCat outages as a "Christmas Gift." It is too soon to tell whether affiliates and penetration testers have lost trust in BlackCat or NoEscape and are moving to other operations. However, it would not be surprising if we soon see another rebrand.

Daily Brief Summary

CYBERCRIME // LockBit Ransomware Capitalizes on Competitors' Disruptions

LockBit ransomware operation is actively recruiting affiliates and developers from disrupted operations BlackCat/ALPHV and NoEscape.

NoEscape affiliates claimed an exit scam by its operators, raising concerns of lost ransom payments and operations shutdown.

The BlackCat/ALPHV ransomware's infrastructure faced a 5-day outage, leading to speculation about a possible law enforcement operation.

LockBit is offering its data leak site and negotiation panel for BlackCat and NoEscape affiliates to use if they have backups of stolen data.

There are already signs of BlackCat/ALPHV's victims appearing on LockBit's data leak site, suggesting movement between groups.

LockBit, considered the largest ransomware operation currently, benefits from competitors' troubles and sees these events as opportunities for expansion.

The ransomware landscape remains dynamic, with the potential for rebranding and relocation of affiliates and developers from disrupted operations.