What Caused the Data Breach?
By: cryptosheadlines|2025/05/08 21:00:08
0
Share
Airdrop Is Live CaryptosHeadlines Media Has Launched Its Native Token CHT. Airdrop Is Live For Everyone, Claim Instant 5000 CHT Tokens Worth Of $50 USDT. Join the Airdrop at the official website, CryptosHeadlinesToken.com In a significant blow to the notorious LockBit ransomware gang, a massive hack exposed sensitive internal data, including details of 60,000 Bitcoin addresses. This data breach follows recent law enforcement efforts to disrupt the gang’s operations, potentially crippling their ability to carry out further crimes.Notably, the exposed data includes negotiation chats, admin credentials, and wallet addresses. These critical documents are now publicly available, providing insights into LockBit’s operations.LockBit Ransomware Gang Data Breach: DetailsLockBit’s dark web affiliate panel was recently compromised, resulting in a complete defacement and exposure of sensitive data. The incident was first uncovered by the threat actor, Rey, who wrote on X, “LockBit just got pwned.” Following the breach, the admin panels show a message instead of the usual login screen:Don’t do crime. CRIME IS BAD. xoxo from Prague”Along with this message is a link to a downloadable archive: paneldb_dump.zip, which contains a MySQL dump of LockBit’s affiliate portal.Inside the LockBit Ransomware DatabaseNotably, the breached database contains 20 tables that reveal the platform’s operations. It includes about 60,000 unique Bitcoin addresses, individual builds created by affiliates for attacks, and configurations used for each build, such as specific servers to skip or files to encrypt. In addition, the data unveils negotiation messages between the LockBit gang and victims, offering a glimpse into their tactics and interactions. Thus, the LockBit Ransomware hack helps an investigator to better understand LockBit’s inner workings.The incident is unfolding at a time when the crypto market experienced a significant uptrend, mainly driven by Trump’s US-UK trade deal announcement.What Caused the Hack?Security researcher Michael Gillespie posited that the data breach occurred due to LockBit ransomware’s lack of proper security measures. The analyst identified that the passwords were kept in plain text, unencrypted, revealing lax security practices, which is ironic given their own malicious activities. This incident follows increasing crypto scams, which forced Australian regulators to shut down 90 companies allegedly linked to pig butchering scams.Though the identity of the breach’s perpetrator and the method used are still unclear, the similar defacement message used in the Everest ransomware breach suggests a possible link.✓ Share: Nynu V Jamal Nynu V Jamal is a passionate crypto journalist with three years of experience in blockchain, web3, and fintech spheres. She has established herself as a knowledgeable and engaging voice in the cryptocurrency and blockchain space. Her experience as an Assistant Professor in English Language and Literature has further added to her quest for crafting informative, well-researched, and accessible content. Disclaimer: The presented content may include the personal opinion of the author and is subject to market condition. Do your market research before investing in cryptocurrencies. The author or the publication does not hold any responsibility for your personal financial loss.Source link
You may also like

Exchanging 200,000 for nearly 100 million, DeFi stablecoins face another attack
DeFi project teams cannot assume that the modules they control are necessarily secure.

The underlying business agreement of the trillion-dollar Agent economy: Understanding ERC-8183, it's not just about payments, but the future
This article systematically analyzes the technical principles and commercial value of the ERC-8183 protocol from the dimensions of technical architecture, core mechanisms, application scenarios, and ecological collaboration.

When Wall Street's ETH begins to "yield": Looking at the asset properties of Ethereum from BlackRock's ETHB
ETH is undergoing a paradigm shift from a "volatile asset" to a "yield-generating cash flow asset."

The Power of Agency: The Agentic Wallet and the Next Decade of Wallets
In 1984, Apple killed the command line with a mouse. In 2026, Agent is killing the mouse.

Understanding x402 and MPP in One Article: Two Routes for Agent Payments
x402 makes payments within the agreement, while MPP makes system-level payments.

Particle Founder: The entrepreneurial insights I have gained the most from in the past year
Stop lean startup, stop lightning entrepreneurship, and think carefully about what your product aspirations are.

Huang Renxun's latest podcast transcript: The future of Nvidia, the development of embodied intelligence and agents, the explosion of inference demand, and the public relations crisis of artificial intelligence
The competition in the future is not just about whose model is larger or whose computing power is stronger, but also about who understands the industry better, who can embed AI more deeply into real processes, and who can organize these capabilities into a runnable and scalable system.

OKX Ventures Research Report: AI Agent Economic Infrastructure Research Report (Part 1)
The existing infrastructure is hostile to the Agent economy. Agents can think and act independently at the "capability level," but at the "economic level," they are still locked into infrastructure designed for humans.

The migration of settlement rights: B18 and the institutional starting point of on-chain banks
In the traditional system, banks decide the settlement; in the on-chain system, code begins to take over this responsibility.

From Tencent and Circle: Looking at the Simple and Difficult Questions of Investment
The AI narrative continues to ferment, but the recent performance of related stocks varies, with some in the midst of summer and others as if in winter.

The second half of stablecoins no longer belongs to the crypto circle
What Coinbase doesn't want, Mastercard is eager to buy.

Cursor "Shell" Kimi Controversy Reversed: From Copyright Infringement Allegations to Authorized Collaboration, China's Open Source Model Once Again Becomes a Global AI Foundation
Cursor was accused of being based on Kimi K2.5, which sparked controversy, and was later confirmed to be compliant through Fireworks AI due diligence.

The Real Reason Tokens Don't Sell: 90% of Crypto Projects Overlook Investor Relations
Provide an Investor Relations Best Practices Guide for Crypto Projects.

Is the income of pump.fun real, earning a million dollars a day despite the market downturn?
If it can really earn this much, what is the reason for the low price of $PUMP?

The real reason why tokens are not selling: 90% of crypto projects neglect investor relations
Investor Relations Practice Guide for Cryptocurrency Projects.

Who is the true winner of the "Tokenization" narrative?
Virtually everyone benefits, but the reason for the benefit, the timing, and the underlying logic are completely different.

Moss: The Era of AI-Traded by Anyone | Project Introduction
AI Trading Agent is rapidly growing its infrastructure.

Chip Smuggling Case Exposes Regulatory Loophole | Rewire News Evening Update
AI chips have become a strategic asset more sensitive than missiles
Exchanging 200,000 for nearly 100 million, DeFi stablecoins face another attack
DeFi project teams cannot assume that the modules they control are necessarily secure.
The underlying business agreement of the trillion-dollar Agent economy: Understanding ERC-8183, it's not just about payments, but the future
This article systematically analyzes the technical principles and commercial value of the ERC-8183 protocol from the dimensions of technical architecture, core mechanisms, application scenarios, and ecological collaboration.
When Wall Street's ETH begins to "yield": Looking at the asset properties of Ethereum from BlackRock's ETHB
ETH is undergoing a paradigm shift from a "volatile asset" to a "yield-generating cash flow asset."
The Power of Agency: The Agentic Wallet and the Next Decade of Wallets
In 1984, Apple killed the command line with a mouse. In 2026, Agent is killing the mouse.
Understanding x402 and MPP in One Article: Two Routes for Agent Payments
x402 makes payments within the agreement, while MPP makes system-level payments.
Particle Founder: The entrepreneurial insights I have gained the most from in the past year
Stop lean startup, stop lightning entrepreneurship, and think carefully about what your product aspirations are.