Skip to content
  Thursday 15 January 2026
Trending
April 26, 2024Cybersecurity Engineer 2 October 28, 2024Cruise the Seven Seas Safely with OT Access Security for Ships and Cranes June 22, 2024Cybersecurity Engineer June 30, 2024Senior Consultant, Cybersecurity – Platinion August 27, 2024Cybersecurity and Privacy – Incident and Crisis Management – Manager March 14, 2025Enterprise Account Executive – Cybersecurity (Georgia) July 10, 2025Cybersecurity Management and Policy, Department of Cybersecurity – Adjunct Faculty August 18, 2023Coordinated Crackdown Leads to Arrest of 14 Alleged Cybercriminals Across Africa December 4, 2025Cybersecurity Program Coordinator July 26, 2024Cybersecurity Engineer -L2
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Industry News  LockBit Ransomware Operation Resumes Activity with New Dark Web Leak Site
Industry News

LockBit Ransomware Operation Resumes Activity with New Dark Web Leak Site

SecuredyouadmSecuredyouadm—February 26, 20240
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
More stories

Potential Security Breach: Exploiting Abandoned Libraries Enables Hackers to Compromise Java and Android Systems

January 22, 2024

Early Cyber Alerts: CISA Shields Critical Infrastructure

May 19, 2025

Unleash Your Cloud Security: GCP Cloud Composer Bug Allows Attackers to Increase Access with Malicious PyPI Packages

April 22, 2025

Russian Social Engineering Tricks Ukrainian Signal Users

February 19, 2025



LockBit, a Russian-speaking ransomware operation, announced its return to hacking on Saturday after a recent takedown by law enforcement agencies as part of Operation Cronos. The leader of LockBit, LockBitSupp, posted a lengthy message on the dark web leak site, vowing to continue despite the efforts to dismantle the operation. The FBI reportedly exploited a vulnerability in PHP to penetrate LockBit’s servers, leading to the takedown. The law enforcement agencies involved in Operation Cronos did not reveal the identity of LockBitSupp, leading to speculation about his true identity.

Despite LockBit’s attempts to make a comeback, experts believe that the operation has been seriously damaged by the takedown and that LockBitSupp’s reputation has been permanently affected. The re-established leak site includes victim entries from just before the takedown, including attacks on entities like Fulton County, Georgia. LockBit claims that the FBI may have used a zero-day PHP exploit and only captured a small portion of the decryptors on their server during the takedown.

LockBitSupp is known for exaggerating and erratic behavior, drawing criticism even from within criminal circles. The FBI’s successful takedown of LockBit has caused doubt and fear in the criminal underground, affecting LockBit’s reliability and reputation. While LockBit may attempt to decentralize its administrative panel to make future takedowns harder, experts believe that affiliates will be hesitant to continue working with the operation due to the recent exposure to law enforcement.

The FBI declined to comment on LockBit’s return to hacking, but experts believe that the impact of Operation Cronos will have a lasting effect on LockBit and its leader. LockBitSupp’s attempt to continue hacking after the takedown may be met with skepticism and wariness from affiliates and potential victims. Despite LockBit’s efforts to regain control, the successful takedown by law enforcement has significantly damaged the operation’s reputation and credibility.

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

LockBit Ransomware Group Returns Following Law Enforcement Takedown
Banking Trojans Exploit Google Cloud Run to Target Latin America and Europe
Related posts
  • Related posts
  • More from author
Industry News

5 Reasons AI-Driven Business Need Dedicated Servers – SmartData Collective

October 14, 20250
Industry News

The Future of Cyberthreat Sharing Post-CISA 2015: What’s Next?

October 1, 20250
Industry News

Meta Strikes $14.2B AI Deal with CoreWeave for Cutting-Edge Infrastructure

October 1, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Cybersecurity Analyst

January 14, 20260
Careers

Lead Cybersecurity – SOX

January 14, 20260
Careers

Senior Cloud Security Engineer, AVP – BXTI Cybersecurity

January 14, 20260
Careers

Sr. Cybersecurity Analyst, Compliance

January 14, 20260
Careers

Cybersecurity Analyst

January 14, 20260
Careers

CYBERSECURITY ANLST SR

January 14, 20260
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Cybersecurity Analyst
  • Lead Cybersecurity – SOX
  • Senior Cloud Security Engineer, AVP – BXTI Cybersecurity
  • Sr. Cybersecurity Analyst, Compliance
  • Cybersecurity Analyst

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures