News Tech: A distributed denial of service (DDoS) attack, according to ransomware gang LockBit, appears to have taken down its leak site. After claiming credit for a cyberattack on security juggernaut Entrust earlier this year, the group launched the attack.
Although LockBit’s server was momentarily back online earlier today, as of the time of writing, it is still offline. The DDoS attack’s perpetrator is unknown.
Security researcher Azim Shukuhi of Cisco Talos claims that since the DDoS attack on LockBit’s darkweb server, which hosts leaks from businesses the gang has attacked, started yesterday, the gang has been receiving “400 requests per second from over 1,000 servers.”
LockBit, which is believed to be based in Russia, has undergone many rebrands since it was initially discovered in 2019. It is currently in its third iteration, branded as LockBit 3.0.
According to reports, Entrust, which offers digital ID services to tens of thousands of businesses worldwide, acknowledged a system breach that started in June. At the time, the event was most likely the work of a “high tier” cyber gang, according to Yelisey Boguslavskiy, head of threat research at the security firm AdvIntel.
Though it admitted the incident took place, Entrust said it had “found no indication to date that the issue has affected the operation or security of our products and services, which are run in separate, air-gapped environments from our internal systems”, but said it was working with a cybersecurity vendor and law enforcement agencies to investigate further. Intimating that any ransom demand made to Entrust has not been satisfied, LockBit has threatened to reveal all of the stolen data. Entrust has been approached by Tech Monitor for a response.
Check the latest news about tech news section for best information.