![LockBit 3.0 Ransomware Victim: logtainer[.]com 1 image 11](https://www.hookphish.com/img.php/2022/06/image-11.png)
Victim Name | logtainer[.]com |
Victim Logo (if available) |
|
Description | Logtainer means high quality transport: easy, efficient and sustainable. The company was established early in 1997 and has been growing ever since, becoming one of the most active private operators on Italian railways. In 2021, Logtainer’s turnover was about 78 million ( EUR ) |
Uploaded Date | 05 Feb, 2024 11:05 UTC |
Dark Web Post Updated | 06 Feb, 2024 00:50 UTC |
Publish Date of Files if Ransom is not Paid | 18 Feb, 2024 20:05:06 |
Lockbit Ransomware Group
LockBit is a ransomware group and a ransomware-as-a-service (RaaS) provider that has been active since September 2019. LockBit uses malware to encrypt and steal data from organizations across various sectors and regions, and demands payment in cryptocurrency for its decryption and return. LockBit also threatens to publish the stolen data online if the ransom is not paid. LockBit is known for its fast encryption speed, self-spreading capability, and double extortion technique.
Citations:
- [1] https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-165a
- [2] https://www.theguardian.com/business/2023/jan/13/what-is-lockbit-ransomware-and-how-does-it-operate-malware-royal-mail
- [3] https://www.securin.io/articles/all-about-lockbit-ransomware/
- [4] https://flashpoint.io/blog/lockbit/
- [5] https://theconversation.com/what-is-lockbit-the-cybercrime-gang-hacking-some-of-the-worlds-largest-organisations-217679
Disclaimer: HookPhish does not engage in the exfiltration, downloading, taking, hosting, viewing, reposting, or disclosure of any files or stolen information. Any legal concerns regarding the content should be directed at the attackers, not HookPhish. This blog is dedicated to posting editorial news, alerting readers about companies falling victim to ransomware attacks. HookPhish has no affiliation with ransomware threat actors or groups, and it does not host infringing content. The information on this page is automatically generated and redacted, sourced directly from the Onion Dark Web Tor Blogs pages.