LockBit ransomware accuses Entrust for DDoS attacks against leak sites and showed proof that may make you smile also

A distributed denial-of-service (DDoS) attack that appears to have been undertaken in retaliation to the cybercriminals disclosing data they had obtained from security firm Entrust has put the leak website of the LockBit ransomware operation offline. Entrust began notifying consumers about the incident on July 6, after it was detected on June 18. The attack was finally discovered on July 21 when a security researcher found a copy of the customer notification that Entrust had sent out.

At the time, some researchers claimed that Entrust had probably fallen prey to ransomware, but no specific group was mentioned. However, the LockBit gang claimed responsibility for the hack on August 18 and threatened to release all of the stolen material in a 24-hour period if Entrust did not pay a ransom.

The Tor-based leak website of the black hat hackers was subjected to a DDoS attack shortly after they began distributing the Entrust data. A line requesting the cybercrime gang to remove the stolen Entrust data was part of the attack requests sent to the LockBit website.

According to VX-Underground when they asked the Lock bit Ransomware group how they know its entrust who is doing the DDoS attack. The ransomware group then shared the screenshot showing the proof with a line of code Delete_Entrust_Motherfuckers. However, this didn’t go well with the group and now finally the data is being distributed to the breach forums by the group.

The cybercrime group has responded to the incident by stating that it is improving its infrastructure to defend it against additional DDoS attacks and that it is looking for alternate storage options that should enable data leakage even if its website is down. In addition, as part of a triple extortion scheme that combines file encryption, data leaks, and DDoS attacks, they want to conduct their own DDoS attacks against victims.

Readers like you help support The Tech Outlook. When you make a purchase using links on our site, we may earn an affiliate commission. We cannot guarantee the Product information shown is 100% accurate and we advise you to check the product listing on the original manufacturer website. Thetechoutlook is not responsible for price changes carried out by retailers. The discounted price or deal mentioned in this item was available at the time of writing and may be subject to time restrictions and/or limited unit availability. Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates Read More

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More

function init() { var vidDefer = document.getElementsByTagName('iframe'); for (var i=0; i