WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Ransomware Awareness – LockBit: Down, but not Out
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Ransomware Awareness – LockBit: Down, but not Out

Author: Chase Snow

Created: Tuesday, February 27, 2024 - 17:45

Categories: Cybersecurity

Following the international takedown operation of the LockBit ransomware group last week – which disrupted LockBit’s criminal network infrastructure and arrested two of its members – the ransomware group’s leader, known as LockBitSupp, has issued a lengthy message on a new dark web site with additional threats and promises of return. The criminal leader made several claims discrediting the FBI’s “attack” and that LockBit was only compromised because of its own negligence at patching (a reminder that everyone needs to patch, even criminals) which allegedly allowed law enforcement to exploit a PHP vulnerability in two of its main servers. LockBitSupp also claims that it didn’t lose much data of significance from the FBI’s exploit because it had backups of victims’ stolen data and that it will “continue to give out data stolen from the attacked companies.” Most notable, LockBit threatened to target the government sector more, specifically the “.gov sector” emphasizing the U.S. government and challenging the FBI. Six new victims have appeared on the new LockBit dark web site with countdown timers including a re-listing of Fulton County, GA and a new entry for the FBI itself. For more information regarding LockBit’s claims of return, access CSO online or Bleeping Computer. LockBit’s full message can be found here.

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar