FreshRSS

Normální zobrazení

Jsou dostupné nové články, klikněte pro obnovení stránky.
PředevčíremHlavní kanál

Hack and payback Instagram scammer gets nabbed after bragging about it on a podcast

A guest who appeared on the No Jumper podcast to boast about a hack and payback scheme involving his victims’ social media accounts could face federal charges. Idriss Qibaa, also known as “Dani” and “Unlocked” who authorities allege ran the social media hacking site Unlocked4Life.com, faces two criminal felony counts filed by the US Attorney's Office in Nevada for allegedly violating interstate communications laws for threats he issued in text messages to two victims and members of their families, according to documents obtained by 404 Media.

Investigators filed the sealed complaint against Qibaa on July 25 and issued a warrant the following Monday when also made his first initial appearance in court, according to federal court records.

The criminal complaint states that the FBI received a tip about Qibaa’s alleged extortion scheme on April 1 pointing to an appearance he made on the No Jumper podcast hosted by Adam22, also known as Adam Grandmaison, back in January under his pseudonym “Dani.” Qibaa outlined a financial scheme using over 200 victims’ social media accounts in which he would lock them out of their pages and charge them to regain access.

He also boasted that he made about $600,000 a month from his activities and hired two security guards to follow him.

“You’re making $2 million a month off your Instagram and Telegraph,” Qibaa says on the podcast. “I come and I take it away and make you pay for it back and I make it public and I post it and I expose you.”

Qibaa even said on the podcast episode that he pulled the scheme on celebrities who unknowingly kept paying him to get their social media back. He later noted “I’m very petty” followed by a menacing laugh.

“I’ve talked to stars who have told me that they’ve paid to get it back 20 times over and over and over they just have to keep paying to get it back,” Qibaa says, “and I’m like you realize what’s happening to you right like the same that’s getting you it back is…you’re getting extorted.”

The criminal complaint tells the story of eight victims’ encounters with Qibaa and his services. One identified as “J.T.” operated two Instagram accounts: a cannabis news aggregate account called “theblacklistxyz” and a cannabis merchandising store under “caliplug,” both of which are currently set to private. J.T. reached out to Qibaa asking if he could obtain a username. Qibaa quoted a price back between $4,000-$5,000. J.T. refused to take Qibaa up on the offer and Qibaa responded with threats.

“Qibba told J.T. that J.T. had wasted Qibaa’s time, blocked J.T.’s Instagram pages and demanded $10,000 to reinstate it,” the complaint reads. “J.T. offered Qibaa $8,500 to reinstate the account, an offer Qibaa accepted.”

The complaint asserts that Qibba reached out to J.T. two more times. The first time, Qibba asked if J.T. would promote his Instagram page under the username “unlocked4life” that’s since been taken down. J.T. agreed but when he learned Qibaa had been threatening and extorting other victims, he confronted Qibaa and “Qibaa was irate.”

A few months later, Qibaa apparently increased the scope of his threats to J.T. and members of his family. He sent threats to call the victim’s ex-wife’s lawyer and child protective services on his kids. Screenshots of the victims’ phone show Qibaa allegedly identifying the address and phone number of the victim’s sister. He texted another family member and introduced himself as “The guy that’s gonna murder your drug dealer brother. Tell him Unlocked says hi though. We have your entire family’s info.”

Another victim identified as a journalist and comedian with the initials “E.H.” learned they were a target of Qibaa’s illegal services. Qibaa blocked their Instagram account, the name of which was redacted, at the request of a dentist in California who treated them. E.H. reached out to the Unlocked4Life account and received a reply that read, “Yo its Idriss.” He then told E.H. to pull up the No Jumper podcast episode featuring his interview. Qibaa not only took the victim’s Instagram account access away but also threatened to take their Social Security number and “blast it out” if they didn’t pay him $20,000.

According to the complaint, not even restraining orders could make Qibaa leave his victims alone. One named “R.B.” received a restraining order from Los Angeles County Superior Court in July but “Unblocked” responded, “Cute restraining order..last I checked you’re still gonna die.” Then “UNLOCKED UNCENSORED” posted on Telegram, “$50,000 reward for whoever sleeps BO this week.”

Perhaps the most disturbing threats happened to several victims in which Qibaa claimed he’d happily go to jail if payments weren’t made to him. Screenshots of the text chains show a person named “Dani” and “Daniel” telling his victims, “I will come and shoot you myself,” “I’m going to bury you for this shit” and “D., L., J., T., Children-Main Targets” referring to the victims’ children.

Another text chain shows Qibaa allegedly threatening someone that he would “rather take a life sentence for murdering you then this,” “Idc if I have to shoot you my self [sic]” and “I’ll go to jail happily.” He follows the text with the threat “Here’s the last guy that came to take photos / came near my home” and sends three pictures of an unidentified bearded man, his car and a photo of his badly bruised and bloodied on the ground.”

Adam22 concluded his podcast interview with “Dani” saying he was “very excited to see the fallout from this” and “I respect the hustle even though I can’t justify it on a moral level.”

This article originally appeared on Engadget at https://www.engadget.com/hack-and-payback-instagram-scammer-gets-nabbed-after-bragging-about-it-on-a-podcast-202509349.html?src=rss

©

© Screenshot from YouTube

Idriss Qibaa could face a federal indictment if a grand jury finds reason to proceeds on two counts of issuing violent threats after locking people out of their social media accounts.

The Justice Department sues TikTok for breaking child privacy laws

The US Department of Justice is suing TikTok for violating a child privacy law and violating a 2019 agreement with the Federal Trade Commission for previous privacy violations. The lawsuit stems from an earlier investigation into the company by the Federal Trade Commission, which referred its privacy case to the DoJ earlier this year.

The FTC had been looking into whether TikTok had violated the terms of an earlier privacy settlement with Musical.ly, which was acquired by ByteDance prior to the launch of TikTok. According to the FTC, the investigation found that TikTok had “flagrantly” violated both the 2019 settlement and the Children's Online Privacy Protection Act (COPPA).

In a statement, the Justice Department also cited TikTok’s collection of personal information about children on its platform and its failure to comply with the requests for the information to be deleted.

From 2019 to the present, TikTok knowingly permitted children to create regular TikTok accounts and to create, view, and share short-form videos and messages with adults and others on the regular TikTok platform. The defendants collected and retained a wide variety of personal information from these children without notifying or obtaining consent from their parents. Even for accounts that were created in “Kids Mode” (a pared-back version of TikTok intended for children under 13), the defendants unlawfully collected and retained children’s email addresses and other types of personal information. Further, when parents discovered their children’s accounts and asked the defendants to delete the accounts and information in them, the defendants frequently failed to honor those requests. The defendants also had deficient and ineffectual internal policies and processes for identifying and deleting TikTok accounts created by children.

In a statement, TikTok said it took issue with the allegations, saying it had previously addressed some of the conduct described by the Justice Department. “We disagree with these allegations, many of which relate to past events and practices that are factually inaccurate or have been addressed,” the company said. “We are proud of our efforts to protect children, and we will continue to update and improve the platform. To that end, we offer age-appropriate experiences with stringent safeguards, proactively remove suspected underage users, and have voluntarily launched features such as default screentime limits, Family Pairing, and additional privacy protections for minors.”

The lawsuit comes at a particularly inconvenient time for TikTok, which is set to face off with the Justice Department in federal court next month over a law that aims to force ByteDance to sell the app or face a ban in the United States.

This article originally appeared on Engadget at https://www.engadget.com/the-justice-department-sues-tiktok-for-breaking-child-privacy-laws-190456433.html?src=rss

© Anadolu via Getty Images

ANKARA, TURKIYE - MAY 16: In this photo illustration, the 'Tiktok' logo is displayed on a mobile phone screen in front of a computer screen displaying the 'Tiktok' logo in Ankara, Turkiye on May 16, 2024. (Photo by Utku Ucrak/Anadolu via Getty Images)

Hack and payback Instagram scammer gets nabbed after bragging about it on a podcast

A guest who appeared on the No Jumper podcast to boast about a hack and payback scheme involving his victims’ social media accounts could face federal charges. Idriss Qibaa, also known as “Dani” and “Unlocked” who authorities allege ran the social media hacking site Unlocked4Life.com, faces two criminal felony counts filed by the US Attorney's Office in Nevada for allegedly violating interstate communications laws for threats he issued in text messages to two victims and members of their families, according to documents obtained by 404 Media.

Investigators filed the sealed complaint against Qibaa on July 25 and issued a warrant the following Monday when also made his first initial appearance in court, according to federal court records.

The criminal complaint states that the FBI received a tip about Qibaa’s alleged extortion scheme on April 1 pointing to an appearance he made on the No Jumper podcast hosted by Adam22, also known as Adam Grandmaison, back in January under his pseudonym “Dani.” Qibaa outlined a financial scheme using over 200 victims’ social media accounts in which he would lock them out of their pages and charge them to regain access.

He also boasted that he made about $600,000 a month from his activities and hired two security guards to follow him.

“You’re making $2 million a month off your Instagram and Telegraph,” Qibaa says on the podcast. “I come and I take it away and make you pay for it back and I make it public and I post it and I expose you.”

Qibaa even said on the podcast episode that he pulled the scheme on celebrities who unknowingly kept paying him to get their social media back. He later noted “I’m very petty” followed by a menacing laugh.

“I’ve talked to stars who have told me that they’ve paid to get it back 20 times over and over and over they just have to keep paying to get it back,” Qibaa says, “and I’m like you realize what’s happening to you right like the same that’s getting you it back is…you’re getting extorted.”

The criminal complaint tells the story of eight victims’ encounters with Qibaa and his services. One identified as “J.T.” operated two Instagram accounts: a cannabis news aggregate account called “theblacklistxyz” and a cannabis merchandising store under “caliplug,” both of which are currently set to private. J.T. reached out to Qibaa asking if he could obtain a username. Qibaa quoted a price back between $4,000-$5,000. J.T. refused to take Qibaa up on the offer and Qibaa responded with threats.

“Qibba told J.T. that J.T. had wasted Qibaa’s time, blocked J.T.’s Instagram pages and demanded $10,000 to reinstate it,” the complaint reads. “J.T. offered Qibaa $8,500 to reinstate the account, an offer Qibaa accepted.”

The complaint asserts that Qibba reached out to J.T. two more times. The first time, Qibba asked if J.T. would promote his Instagram page under the username “unlocked4life” that’s since been taken down. J.T. agreed but when he learned Qibaa had been threatening and extorting other victims, he confronted Qibaa and “Qibaa was irate.”

A few months later, Qibaa apparently increased the scope of his threats to J.T. and members of his family. He sent threats to call the victim’s ex-wife’s lawyer and child protective services on his kids. Screenshots of the victims’ phone show Qibaa allegedly identifying the address and phone number of the victim’s sister. He texted another family member and introduced himself as “The guy that’s gonna murder your drug dealer brother. Tell him Unlocked says hi though. We have your entire family’s info.”

Another victim identified as a journalist and comedian with the initials “E.H.” learned they were a target of Qibaa’s illegal services. Qibaa blocked their Instagram account, the name of which was redacted, at the request of a dentist in California who treated them. E.H. reached out to the Unlocked4Life account and received a reply that read, “Yo its Idriss.” He then told E.H. to pull up the No Jumper podcast episode featuring his interview. Qibaa not only took the victim’s Instagram account access away but also threatened to take their Social Security number and “blast it out” if they didn’t pay him $20,000.

According to the complaint, not even restraining orders could make Qibaa leave his victims alone. One named “R.B.” received a restraining order from Los Angeles County Superior Court in July but “Unblocked” responded, “Cute restraining order..last I checked you’re still gonna die.” Then “UNLOCKED UNCENSORED” posted on Telegram, “$50,000 reward for whoever sleeps BO this week.”

Perhaps the most disturbing threats happened to several victims in which Qibaa claimed he’d happily go to jail if payments weren’t made to him. Screenshots of the text chains show a person named “Dani” and “Daniel” telling his victims, “I will come and shoot you myself,” “I’m going to bury you for this shit” and “D., L., J., T., Children-Main Targets” referring to the victims’ children.

Another text chain shows Qibaa allegedly threatening someone that he would “rather take a life sentence for murdering you then this,” “Idc if I have to shoot you my self [sic]” and “I’ll go to jail happily.” He follows the text with the threat “Here’s the last guy that came to take photos / came near my home” and sends three pictures of an unidentified bearded man, his car and a photo of his badly bruised and bloodied on the ground.”

Adam22 concluded his podcast interview with “Dani” saying he was “very excited to see the fallout from this” and “I respect the hustle even though I can’t justify it on a moral level.”

This article originally appeared on Engadget at https://www.engadget.com/hack-and-payback-instagram-scammer-gets-nabbed-after-bragging-about-it-on-a-podcast-202509349.html?src=rss

© Screenshot from YouTube

Idriss Qibaa could face a federal indictment if a grand jury finds reason to proceeds on two counts of issuing violent threats after locking people out of their social media accounts.

The Justice Department sues TikTok for breaking child privacy laws

The US Department of Justice is suing TikTok for violating a child privacy law and violating a 2019 agreement with the Federal Trade Commission for previous privacy violations. The lawsuit stems from an earlier investigation into the company by the Federal Trade Commission, which referred its privacy case to the DoJ earlier this year.

The FTC had been looking into whether TikTok had violated the terms of an earlier privacy settlement with Musical.ly, which was acquired by ByteDance prior to the launch of TikTok. According to the FTC, the investigation found that TikTok had “flagrantly” violated both the 2019 settlement and the Children's Online Privacy Protection Act (COPPA).

In a statement, the Justice Department also cited TikTok’s collection of personal information about children on its platform and its failure to comply with the requests for the information to be deleted.

From 2019 to the present, TikTok knowingly permitted children to create regular TikTok accounts and to create, view, and share short-form videos and messages with adults and others on the regular TikTok platform. The defendants collected and retained a wide variety of personal information from these children without notifying or obtaining consent from their parents. Even for accounts that were created in “Kids Mode” (a pared-back version of TikTok intended for children under 13), the defendants unlawfully collected and retained children’s email addresses and other types of personal information. Further, when parents discovered their children’s accounts and asked the defendants to delete the accounts and information in them, the defendants frequently failed to honor those requests. The defendants also had deficient and ineffectual internal policies and processes for identifying and deleting TikTok accounts created by children.

In a statement, TikTok said it took issue with the allegations, saying it had previously addressed some of the conduct described by the Justice Department. “We disagree with these allegations, many of which relate to past events and practices that are factually inaccurate or have been addressed,” the company said. “We are proud of our efforts to protect children, and we will continue to update and improve the platform. To that end, we offer age-appropriate experiences with stringent safeguards, proactively remove suspected underage users, and have voluntarily launched features such as default screentime limits, Family Pairing, and additional privacy protections for minors.”

The lawsuit comes at a particularly inconvenient time for TikTok, which is set to face off with the Justice Department in federal court next month over a law that aims to force ByteDance to sell the app or face a ban in the United States.

This article originally appeared on Engadget at https://www.engadget.com/the-justice-department-sues-tiktok-for-breaking-child-privacy-laws-190456433.html?src=rss

© Anadolu via Getty Images

ANKARA, TURKIYE - MAY 16: In this photo illustration, the 'Tiktok' logo is displayed on a mobile phone screen in front of a computer screen displaying the 'Tiktok' logo in Ankara, Turkiye on May 16, 2024. (Photo by Utku Ucrak/Anadolu via Getty Images)

Five men face jail time for running the illegal streaming service Jetflicks

The illegal streaming service Jetflicks once boasted on its website that visitors could watch just about any TV show or movie “Anytime. Anywhere.” Now the five people behind the bootleg streaming service are facing some serious jail time.

A jury found Kristopher Dallman, Douglas Courson, Felipe Garcia, Jared Jaurequi and Peter Huber guilty in a Las Vegas federal court on Friday for conspiracy to commit criminal copyright infringement. Dallmann was also found guilty on two counts of money laundering and three counts of misdemeanor criminal copyright infringement for leading the Jetflicks operation, according to court documents and a US Department of Justice press release.

Jetflicks used computer scripts and software to scour the internet for illegal copies of movies and television shows and posted hundreds of thousands of illegal copies as far back as 2007 from torrent and Usenet sites. The defendants created a catalog of bootleg shows and movies bigger than the combined collections of streaming services including Netflix, Hulu, Vudu and Amazon Prime, according to the Department of Justice.

Users could pay a subscription fee to access the site on pretty much any media streaming device with a web browser. Jetflicks claimed to “offer more than 183,200 television episodes and have more than 37,000 subscribers,” according to the initial indictment filed in the Eastern District of Virginia in 2019.

Dallmann, the leader of the group, and his co-conspirators “made millions of dollars streaming and distributing this catalog of stolen content,” according to the press release.

At one point, operators and employees of Jetflicks were making hundreds of thousands of dollars a year from its subscription service. Dallman wrote in an online chat that his site made $750,000 in one year, according to the indictment.

The Motion Picture Association of America (MPAA) took notice of Jetflicks in 2012 and sent cease and desist letters to the site’s operators. Four years later, the Federal Bureau of Investigation (FBI) started its undercover operation of the site by paying for a six-month subscription. Undercover agents recorded multiple instances of illegal uploads of shows like Shameless, Ray Donovan, The OA and SyFy’s 12 Monkeys alongside charges for accessing them. Then the agents traced those charges back to the defendants’ bank accounts, according to court records.

A sentencing hearing has yet to be scheduled. The Department of Justice says Dallman could face up to 48 years in prison and the four remaining defendants could each face five years in prison.

This article originally appeared on Engadget at https://www.engadget.com/five-men-face-jail-time-for-running-the-illegal-streaming-service-jetflicks-202758485.html?src=rss

© Jetflicks (Internet Archive)

Jetflicks screenshot

Block reportedly greenlit transactions involving terrorist groups and sanctioned nations

Block appears to be squarely in the government’s sights. Prosecutors from the Southern District of New York are reportedly probing extensive compliance lapses at the parent company of Square and Cash App. NBC News says a former Block employee has handed over documents to federal authorities, painting a picture of how the company failed to gather required risk-assessment information from customers and subsequently processed illegal transactions.

The documents allegedly show that Block greenlit multiple crypto transactions involving known terrorist organizations. Furthermore, Square reportedly processed thousands of transfers involving nations under economic sanctions. “From the ground up, everything in the compliance section was flawed,” the whistleblower allegedly told NBC News. “It is led by people who should not be in charge of a regulated compliance program.”

Most transactions allegedly involved credit cards, dollar transfers or Bitcoin and weren’t reported to the government as mandated by law. In addition, Block reportedly refused to “correct company processes” when notified of the breaches.

The investigation follows a separate report from NBC News in February highlighting two different whistleblowers who flagged the same issues at Block. They cited “questionable Cash App transactions with entities under sanction by the Treasury Department’s Office of Foreign Assets Control, operations known to sell personal information and credit card data for illegal purposes, and offshore gambling sites barred to U.S. citizens.”

The practice allegedly spanned multiple years. NBC News says it reviewed around 100 pages of documents from the whistleblower involving people or organizations in countries under US sanctions, including Russia, Iran, Venezuela and Cuba. Some of them were reportedly from as recent as 2023.

Graphic from finance company Block showing Jack Dorsey's face on a cube.
Block

The whistleblower claims Block’s management was aware of the alleged offenses. “It’s my understanding from the documents that compliance lapses were known to Block leadership and the board in recent years,” Edward Siedle, a former SEC attorney representing the whistleblower, told NBC News.

The whistleblower says that, besides senior management, Block’s board was told about the compliance issues. Coincidentally or not, several board members made unexpected exits recently, including former US treasury secretary Lawrence Summers, who resigned in February, and Sharon Rothstein, who had been on the board since 2022. Block told NBC News that they were leaving to devote more time to other activities and that their exits weren’t “a result of any disagreements with the company on any matter relating to the company’s operations, policies or practices.”

Federal authorities have taken a greater interest in modern financial platforms in recent years after at least some of them had become something of a Wild West. Of course, FTX’s fraudulent practices and subsequent collapse led to a seismic decline in the cryptocurrency industry. Although it isn’t clear if the feds have gotten involved, Elon Musk’s X (the husk of what was once Dorsey’s Twitter) reportedly violated US sanctions by accepting blue-check subscription payments from terrorist organizations.

This article originally appeared on Engadget at https://www.engadget.com/block-reportedly-greenlit-transactions-involving-terrorist-groups-and-sanctioned-nations-181222712.html?src=rss

© Block

Left three-quarters view of Block CEO Jack Dorsey. He's sitting in an empty inclined seating area with modern wooden benches.

Binance founder Changpeng Zhao sentenced to four months in prison

A federal judge has sentenced Binance founder Changpeng Zhao (often known as “CZ”) to four months in prison, as first reported by The New York Times. Prosecutors had recommended three years. Zhao pleaded guilty in November to violating the Bank Secrecy Act by failing to set up an anti-money-laundering program.

The DOJ accused Zhao of allowing criminal activity to flourish on the crypto exchange. “Binance turned a blind eye to its legal obligations in the pursuit of profit. Its willful failures allowed money to flow to terrorists, cybercriminals, and child abusers through its platform,” Treasury Secretary Janet Yellen said in November.

The government accused Binance of refusing to comply with American sanctions and failing to report suspicious transactions related to drugs and child sexual abuse materials. Prosecutors said in court that Zhao had told Binance employees it was “better to ask for forgiveness than permission” while bragging that if Binance had obeyed the law, it wouldn’t be “as big as we are today.”

Under the plea deal’s terms, Binance agreed to forfeit $2.5 billion and pay a $1.8 billion fine. Zhao personally paid $50 million as part of the settlement.

Although the charges differed, Zhao’s sentence is dramatically shorter than the 25 years fellow crypto figurehead Sam Bankman-Fried received in March. SBF, as he’s often known, was convicted on seven counts of fraud and conspiracy for his role at the helm of the crypto platform FTX.

Zhao played an integral role in Bankman-Fried’s downfall — and the crypto industry’s broader decline in the last 18 months. The Binance founder tweeted in November 2022 that his company would liquidate its holdings in FTX’s de facto token. He said “recent revelations that have came[sic] to light” while citing “ethical concerns” and “regulatory risks.” The posts not only crushed FTX but the crypto world at large. (They likely helped attract the government’s attention as well.) When FTX’s wells dried up following the platform’s rapid collapse, Zhao briefly agreed to buy the company but quickly backed out.

Prosecutors said Zhao’s crime carried a standard federal sentence of 12 to 18 months but argued for a three-year term, describing his crimes as being “on an unprecedented scale.” But Judge Richard A. Jones saw it differently, sentencing him to a measly one-twelfth of the government’s suggested term.

“This wasn’t a mistake — it wasn’t a regulatory oops,” Kevin Mosley, a DOJ lawyer, reportedly said in court on Tuesday. “Breaking U.S. law was not incidental to his plan to make as much money as possible. Violating the law was integral to that endeavor.”

This article originally appeared on Engadget at https://www.engadget.com/binance-founder-changpeng-zhao-sentenced-to-four-months-in-prison-205550299.html?src=rss

© JASON REDMOND via Getty Images

Former Binance CEO Changpeng "CZ" Zhao arrives at federal court in Seattle, Washington, on April 30, 2024. US prosecutors want Changpeng Zhao, the founder and former chief executive of Binance, the world's largest cryptocurrency exchange, to serve three years in prison after he pleaded guilty to violating laws against money laundering. (Photo by Jason Redmond / AFP) (Photo by JASON REDMOND/AFP via Getty Images)

Members of ransomware gang Lockbit arrested by law enforcement

International law enforcement, led by the UK’s National Crime Agency, have disrupted ransomware gang Lockbit's operation. The group behind notable hacks against aircraft manufacturer Boeing, chip giant Taiwan Semiconductor Manufacturing Company, sandwich chain Subway and thousands more had its site taken offline on Monday while authorities arrested major players behind the gang. "This site if now under the control of law enforcement," the website reads. According to malware repository Vx-underground, law enforcement took down at least 22 Lockbit-affiliated Tor sites.

"Through our close collaboration, we have hacked the hackers; taken control of their infrastructure, seized their source code, and obtained keys that will help victims decrypt their systems," National Crime Agency Director General, Graeme Biggar, said in a statement. “As of today, LockBit are locked out. We have damaged the capability and most notably, the credibility of a group that depended on secrecy and anonymity."

Lockbit admitted defeat, too. In a statement to Vx-underground, the group said "FBI pwned me." Operation Cronos, the name law enforcement used for their efforts, also resulted in the seizure of source code and other useful data related to Lockbit's operations. At the same time, authorities in Poland, Ukraine and the US arrested key members of the ransomware operation. There are sanctions out for two more Lockbit affiliates in Russia.

There's more good news for Lockbit victims, too: The operation obtained keys from Lockbit to create a decryption tool for victims to get their data back, according to US Attorney General Merrick Garland. The free decryptors can be found via the No More Ransom project

Since 2019 when Lockbit first entered the scene, it's squeezed victims for more than $120 million in ransomware payments, according to acting assistant AG Nicole Argentieri.

This article originally appeared on Engadget at https://www.engadget.com/members-of-ransomware-gang-lockbit-arrested-by-law-enforcement-144245076.html?src=rss

© Reuters / Reuters

FILE PHOTO: A screenshot taken on February 19, 2024 shows a take down notice that a group of global intelligence agencies issued to a dark web site called Lockbit. Handout via REUTERS/File Photo

Members of ransomware gang Lockbit arrested by law enforcement

International law enforcement, led by the UK’s National Crime Agency, have disrupted ransomware gang Lockbit's operation. The group behind notable hacks against aircraft manufacturer Boeing, chip giant Taiwan Semiconductor Manufacturing Company, sandwich chain Subway and thousands more had its site taken offline on Monday while authorities arrested major players behind the gang. "This site if now under the control of law enforcement," the website reads. According to malware repository Vx-underground, law enforcement took down at least 22 Lockbit-affiliated Tor sites.

"Through our close collaboration, we have hacked the hackers; taken control of their infrastructure, seized their source code, and obtained keys that will help victims decrypt their systems," National Crime Agency Director General, Graeme Biggar, said in a statement. “As of today, LockBit are locked out. We have damaged the capability and most notably, the credibility of a group that depended on secrecy and anonymity."

Lockbit admitted defeat, too. In a statement to Vx-underground, the group said "FBI pwned me." Operation Cronos, the name law enforcement used for their efforts, also resulted in the seizure of source code and other useful data related to Lockbit's operations. At the same time, authorities in Poland, Ukraine and the US arrested key members of the ransomware operation. There are sanctions out for two more Lockbit affiliates in Russia.

There's more good news for Lockbit victims, too: The operation obtained keys from Lockbit to create a decryption tool for victims to get their data back, according to US Attorney General Merrick Garland. The free decryptors can be found via the No More Ransom project

Since 2019 when Lockbit first entered the scene, it's squeezed victims for more than $120 million in ransomware payments, according to acting assistant AG Nicole Argentieri.

This article originally appeared on Engadget at https://www.engadget.com/members-of-ransomware-gang-lockbit-arrested-by-law-enforcement-144245076.html?src=rss

© Reuters / Reuters

FILE PHOTO: A screenshot taken on February 19, 2024 shows a take down notice that a group of global intelligence agencies issued to a dark web site called Lockbit. Handout via REUTERS/File Photo
❌
❌