LOCKBIT 3.0 is a well-known Ransomware Group that was initially recognized on December 9, 2022. Operating under different aliases and suspected to be engaged in a variety of online activities, this group presents a substantial risk in the realm of cybersecurity.
For more comprehensive analyses and ongoing monitoring of the cybersecurity landscape, you may want to consider subscribing to individual Cyber Intelligence Feeds.
Essential Information
- Designation: LOCKBIT 3.0
- Nicknames: –
- Initial detection: December 9, 2022
- Suspected nicknames: –
Engagements
- Active Platforms:
- lockbitapt6vx57t3eeqj – REDACTED – nygvokja5uuccip4ykyd.onion
- lockbitapt2d73krlbewgv27tqul – REDACTED – 6rkyieto7u4ncead.onion
- lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion
- pa32ymaeu62yo5th5mrai – REDACTED – 2carjliarodltmqcqd.onion
Targets
REGION
- Argentina
- Australia
- Austria
- Barbados
- Belgium
- Brazil
- Bulgaria
- Canada
- Chile
- China
- Colombia
- Cyprus
- Czech Republic
- Ecuador
- Egypt
- Fiji
- Finland
- France
- Germany
- Greece
- Guatemala
- Haiti
- Iceland
- India
- Indonesia
- Iran
- Israel
- Italy
- Jamaica
- Japan
- Jordan
- Kuwait
- Lebanon
- Luxembourg
- Malaysia
- Mexico
- Monaco
- Myanmar
- Namibia
- Netherlands
- Nicaragua
- Norway
- Oman
- Pakistan
- Panama
- Paraguay
- Peru
- Philippines
- Portugal
- Qatar
- Saudi Arabia
- Senegal
- Singapore
- South Africa
- South Korea
- Spain
- Sweden
- Switzerland
- Taiwan
- Thailand
- Trinidad and Tobago
- Tunisia
- Turkey
- United Arab Emirates
- United Kingdom
- US
- USA
- Uruguay
- Vietnam
(AI-Powered)
