Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

FBI responds to threats and announcement of LockBit 4.0

Alessio Stefan : 22 December 2024 09:22

In the last month of 2024, LockBit has been exodusively talked about. The prominent news is the long-awaited release of the 4.0 program of the most famous RaaS in the scene. After the entire Operation Cronos series, which does not seem to be over yet, LockBit has been put to the test with an unprecedented digital crime-fighting experience executed by an international task force.

In this article we will expand on the very latest updates trying to take stock and comment on these early (partial) conclusions of a real attrition that will impact the future of digital security and crime.

For those who would like to get the full context and delve into the timeline in question find listed, in chronological order the major phases of Lockbit vs. Operation Cronos:

  1. Operation Cronos task force reopens domain seized from LB by posting a timer on ad-hoc created posts (May 6, 2024)
  2. Operation Cronos publishes first results from investigation of data obtained from LB backend, Dmitry Yuryevich Khoroshev is identified as responsible for RaaS (May 8, 2024)
  3. LB publishes more than 20 victims in less than a week, 2 people are prosecuted as guilty of collaborating in the distribution and production of the group’s ransomware. Other groups manage to benefit from the operation by attracting affiliates to themselves who have distanced themselves from LB. (August 7, 2024)
  4. Act III of OP Cronos, Evil Corp is identified as one of the affilliates that brought in a high number of takings to RaaS. First sanctions are implemented and promise to continue investigations to dismantle the group one piece at a time (Oct. 1, 2024)
  5. Official release of LockBit 4.0 (December 19, 2024)

Unexpensive Chains

Vuoi diventare un Ethical Hacker?
Non perdere i nostri corsi e scrivi subito su WhatsApp al numero
375 593 1011  per richiedere informazioni dicendo che hai trovato il numero sulle pagine di Red Hot Cyber

Supporta RHC attraverso:


Ti piacciono gli articoli di Red Hot Cyber? Non aspettare oltre, iscriviti alla newsletter settimanale per non perdere nessun articolo.

November 29, 2024, Kaliningrad, Russia. Local law enforcement announced the arrest of “Wazawaka” described as a central figure in the development of as many as 3 ransomware groups : Conti, Babuk and, of course, LockBit. Behind the nickname was Mikhail Pavlovich Matveev, 32-year-old Russian to whom a $10 MLN bounty had already been issued through the FBI’s Reward For Justice program.

According to the charges thanks to Mikhail‘s contribution they would have made (in total) $200 MLN for the 3 groups, the investigation allegedly began in January 2024 and at the time of his arrest he was still active within LockBit.

The fact that Russian authorities arrested a ransomware developer who had stated in his posts, on underground forums, not to attack ex-CIS nations goes against the typical unwritten rule about not receiving interest from local authorities as long as they are harmless to the latter. It is still unclear why this arrest was made, and opaque Russian legal procedures do not help in obtaining further information, among the various speculations is the interest on obtaining Wazawaka’s earnings.

The administrator of the Telegram channel Club 1337 made direct contact with Mikhail, who confirmed that he is charged under Russian Article 273 (Computer Information as a Crime), to be released pending sentencing and the confiscation of a “significant” portion of his cryptocurrencies estimated to amount to a few million dollars.

Other members of LockBit had been arrested before but they were either affiliates or responsible for money laundering. Mikhail is the first central component of the group to be arrested, the list of wanted persons (by the US) related to LockBit are as follows:

  • Bassterlord (Ivan Kondratyev): The second most famous LockBit component after LBSupp, responsible for the use of LockBit 2.0 and LockBit 3.0 ransomware was a member of the group after the paper contest in the summer of 2020. For those interested in this figure, Jon DiMaggio published an entire post from his Ransomware Diaries series starring Bassterlord.
  • Dmitry Khoroshev: Identified in the second phase of Operation Cronos, he is accused of being among the group’s top leadership and responsible for developing the code for at least 65 versions of the malware.
  • Artur Sungatov: According to investigation, this LB affiliate allegedly used ransomware on at least 12 U.S. victims including digital infrastructure of law enforcement and medical clinics

If with Mikhail we cannot get information regarding his arrest and serious interrogation with Rostislav Panev things get decidedly more interesting. 51-year-old Haifa (Israel) resident arrested on August 18, 2024 under U.S. request with extradition confirmation in December 12, 2024 is believed to be another central developer for LockBit and to be in direct contact with LockBitSupp.

Rostislav Panev

News of his arrest was only recently made public with initial statements on the charges. Investigators traced Panev‘s early activities in the group’s early days in 2019 to his arrest in 2024; his role was the development of builders used by affiliates to generate executable versions of the ransomware. One of his contributions was the feature that allowed the malware to print out hardcopy versions of the group’s ransom note.

Forensic investigations on the devices following the arrest revealed a direct connection between Panev and Dmitry Khoroshev using the moniker LockBitSupp in which they discussed the advancement of malwares and affiliate control panel. His work was paid for with regular payment that would amount to about $230,000 over these 5 years of activity.

Finally, credentials were found for access to the code repository of several LockBit builders, the exfiltration tool called StealBit, and also access to the group’s administrative panel.

A legal battle is currently underway between Panev’s lawyer, Sharon Nahari, and the Israeli government, who, according to the lawyer, have made untrue allegations regarding money laundering, malware use and extortion, stressing that his client has limited himself to only developing tools for the group.

It is clear to all that Operation Cronos, after gaining access to the backend, tested the OPSEC of all members and affiliates proving that with the right approach it is possible to trace the identity of anonymous actors. Now that Panev will be extradited to the U.S. combined with all the information collected from his devices will play a crucial role in future operations.

Extradition is scheduled for January 15, 2025.

You Stop, You Lose

LockBitSupp has always been marked by a strong dose of arrogance accompanied by provocations to law enforcement agencies (specifically the FBI and NCA) showing itself immune to attacks by the latter. After the election of Donald Trump (to which LBSupp has never hidden its appreciation) the status of the TOX profile was changed to this:

Source VX Underground

Leaving aside political preference, this is not the first time LB has explicitly mentioned a new version of their operations. Until now there were only discussions about it, but as of November 6, 2024, it seems to be official without any further information about it, however.

Panev’s arrest may have been one of the causes that led to the slowdown in the release of the 4.0 program and also, LockBit had experienced technical problems that led the group to publish a statement on how to contact the group going straight to the point without getting lost in too many turns of phrase. With a good deal of confidence we can conclude that Panev‘s arrest created no small amount of damage, and this would explain why they did not want to make his arrest public directly in August.

At the beginning of December 2024 the status was changed to “17 декабря” (December 17), we could expect an official announcement of the new program but surprisingly LockBit presents a new opportunity to provoke its detractors.

A statement was released with a protected zip file intended for Christopher Wray, director of the FBI. Below is the statement translated from Russian:

Friends, today is a great day: it’s the FBI director’s birthday!
Dear Christopher Asher Ray. On this beautiful day, I would like to wish you a happy birthday from the bottom of my heart and wish you all the best. May your life always be beautiful and full of good moments, like the one when you caught me or at least recognized my identity. May your memories be only bright and good, like when you were tricked by your staff and told that they had found me. May you only be surrounded by people who help you climb even higher, but where to go even higher? May your work be easy and favored, and may your salary be as high and desirable as mine. May your eyes always shine as brightly as they do now, may your money never run out, and may all your dreams come true as quickly as you wish. Accept this archive as a gift. Please do not download this archive under any circumstances, it is an archive only for the Director of the FBI. Again, happy birthday!

Ironically, Christopher Wray announced his retirement on December 16, 2024. This provocation will come in handy in the concluding section of the article.

To end the year LB has finally published the first affiliate enrollment links of the new RaaS program. As already analyzed by Sandro Sana besides the payment of $777 in XMR or BTC there are no further requirements. For now this is all that is known besides the official release date set for February 3, 2025.

RaaS despite all that is happening to them does not seem to want to stop, we would like to remind ourselves of the concept expressed in the first public statement after Operation Cronos where LBSupp stated that it is no longer about money but about getting as many victims as possible on his DLS as a challenge against the FBI.

Conclusions – What doesn’t kill you…

The latest update on this conflicting loop comes from a LinkedIn post by FBI Cyber Operations Crime Director Brett Leatherman that quotes Wray’s words:

“No matter how hidden or advanced the threat, the FBI remains committed to working with our interagency partners to safeguard the cyber ecosystem and hold accountable those who are responsible for these criminal activities.”

Director Wray

It seems clear the commitment made and the willingness in continuing Operation Cronos by the FBI combined with the entire task force set up to suppress LockBit. The humiliation brought by the seizure of part of the DLS and StealBit servers accompanied by LBSupp’s request to cooperate if law enforcement published the ALPHV/BLACKCAT deanon put the RaaS in a very bad light.

Behind all the technicalities and arrests is blatant a strong PsyOPS (Psychological Operation) showing themselves to be firm and sturdy in the face of those who (claim) to be equally so. A 3D chess game where the two sides more or less explicitly communicate their intentions. Whatever the conclusion, 2025 promises to be a pivotal year for this standoff but we can reflect on the whole Cronos event achieved in 2024.

  1. “Hacking back” operations should be a tool to be considered in the fight against digital crime. There is a legislative (if not mental) roadblock in this regard, in Europe and the U.S. it remains an illegal practice (except of course for government companies) but countries such as Belgium have created a legislative framework in this regard. It has been sufficently demonstrated how the OPSEC of attackers is not as thriving and effective as it is vaunted by allowing information to be obtained at the attribution of the crimes committed and also a proactive type of law enforcement that could greatly help to reduce the capabilities of the actors in question.
  2. Redefinition of attackers’ profile. A wrong perception of the threat can lead one to overestimate it or underestimate one’s ability to protect and counter it. It is common to be confronted with a fallacious description of attackers as being “one step ahead” or “of superior intelligence and technical capabilities” but this is simply not true; examples of standardized attacks perpetuated by individuals with discrete skills are numerous. Operation Cronos has uncovered a number of lies and technical flaws that are almost trivial for someone like LockBit (ex:/ affiliate data saved in the clear, indiscreet social media usage, malware features not implemented) and this should give pause that with the right approach appropriate protection is within reach.
  3. State-of-things & state-of-mind, this is the shortest and most precise definition of “security” (se-cure, “without anxiety”). Leaving aside LockBit’s state-of-things in the midst of this immense operation, state-of-mind seems to have played a key role by putting pressure on LBSupp. The many repeated statements and threats (such as those to the FBI director) have increased since the first DLS seizure. There have been several debates about the NCA’s approach and the use of British humor in the content published in the rebranded DLS by British forces, for some it was not appropriate for a national agency while for others it was the right response to the type of personalities one is facing. Only time will confirm or not confirm the effectiveness of the approach; the reflection that is intended is on the attention given to this aspect. From public statements to not making certain arrests public, there is an attempt to play up multiple aspects of LockBit security by trying to bridge the obvious geographic limitations.

For now, we cannot predict what the LockBit 4.0 program really is or even what the group’s goals, capabilities and endgame really are, but it is certainly setting a precedent in digital crime that will set a new standard for future threats.

Alessio Stefan
Member of the Dark Lab group. Master's student of AI & Cybersecurity and CTF player with a passion for ethical hacking that has been with him since a young age. He spends his days immersed in studying and discovering new methods of attack with just the right amount of practice. Convinced that hacking is a culture he applies its principles not only in the digital world but also to daily life while waiting of turning his dedication into a career.