Wednesday, February 8, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > LockBit is a victim of a DDoS attack coming from its victim

LockBit is a victim of a DDoS attack coming from its victim

LockBit's attempt to publically leak data of its victim, Entrust, has failed due to a counter-attack.


Rusen Gobel Rusen Gobel
August 24, 2022
2 min read
LockBit is a victim of a DDoS attack coming from its victim
  • LockBit ransomware group has managed to breach Entrust’s servers to conduct a ransomware attack and steal the data.
  • After the negotiations between LockBit and Entrust failed, the ransomware group decided to leak the stolen data on their Tor website.
  • At the time they published the stolen data, LockBit’s Tor website faced a DDoS attack; they obviously think Entrust is behind this attack.

One of the biggest ransomware operators, LockBit, managed to breach Entrust, which is a payment, identity, and data protection service provider in late July. The malicious actors have conducted a ransomware attack and stolen the data from Entrust’s servers. And they demanded $8 million for decryption and not to leak the stolen data.

Failed negotiations

The amount of money LockBit demands went down to $6.8 from $8 million. However, despite the discount, the negotiations failed and the group decided to leak the data they have stolen. On the 19th of August, the last Friday, LockBit has begun the process to leak the data on the Tor website. At the same time, that website faced a DDoS attack and went offline. The DDoS attacks carried a message as well, which can be seen in the Tweet below:

Lockbit: "We're being DDoS'd because of the Entrust hack"

vx-underground: "How do you know it's because of the Entrust breach?"

Lockbit: pic.twitter.com/HUO2hdTbwz

— vx-underground (@vxunderground) August 21, 2022

LockBit group obviously thinks Entrust has conducted this DDoS attack and made a statement to BleepingComputer as follows:

« DDoS attacks began immediately after the publication of data and negotiations, of course, it was them, who else needs it? In addition, in the logs, there is an inscription demanding the removal of their data. »

If Entrust really conducted a DDoS attack on LockBit’s Tor website, it might be the first legitimate company that counter-attacks the hackers by utilizing illegal ways. However, the attacks might have been conducted by another person/organization that could be negatively affected by the data leaks. Currently, Entrust did not make any statement about those DDoS attacks.

LockBit operators have decided to publish the leaked data via torrents.

See more Cybersecurity News


Tags: Entrust Corp
Rusen Gobel

Rusen Gobel

Rusen Gobel is a news editor at Cloud7 News. With more than 10 years of experience, Rusen worked as a hardware and software news editor for technology sites such as Shiftdelete, Teknokolis, Hardware Plus, BT Haber. In addition, Rusen publishes consumer product reviews on his YouTube channel. While consumer electronics has been his main focus for years, now Rusen is more interested in WordPress and software development. He had contributed different web application projects in his professional career. Rusen had graduated from Istanbul University, department of Computer Engineering. Rusen has a very high passion for learning and writing for every kind of technology. That's why he has been working as a tech editor for more than ten years on several different technology magazines and online news portals.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
Microsoft Teams is now available for third-party apps

Microsoft Teams is now available for third-party apps

Related News

New local privilege escalation vulnerability strikes X.Org server

New local privilege escalation vulnerability strikes X.Org server

February 7, 2023 9:45 pm
Red Hat brings new security capabilities to Red Hat OpenShift

Red Hat brings new security capabilities to Red Hat OpenShift

February 7, 2023 8:55 pm
Cisco fixes command injection vulnerability

Cisco fixes command injection vulnerability

February 6, 2023 5:00 pm
Fortra's GoAnywhere managed file transfer is under attack

Fortra’s GoAnywhere managed file transfer is under attack

February 6, 2023 4:00 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Editor's Choice

What’s new in Linux kernel 6.2 rc6?

10 Best Web Hosting Services of 2023

Ubuntu 22.04 LTS is available for download. What is new?

CERN and Fermilab recommend AlmaLinux

7 best hosting control panels of 2023

How to update Linux Kernel without rebooting?

7 best Linux mail servers of 2023

7 best cPanel alternatives for 2023

7 best Linux web browsers for 2023

7 best CentOS alternatives

7 best Linux server distros of 2023

Interview with Igor Seletskiy on AlmaLinux

How to create a VM on VMware Workstation

Recent News

  • New local privilege escalation vulnerability strikes X.Org server
  • Red Hat brings new security capabilities to Red Hat OpenShift
  • With BuddyPress 12.0, BP Rewrites will support backward compatibility
  • Dell to lay off 6,650 employees
  • Canonical joins the Academy Software Foundation

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.