Teacher
Professional
- Messages
- 2,669
- Reaction score
- 819
- Points
- 113
The international operation Kronos is bearing fruit.
As part of the international operation Kronos, which began on Monday, February 19, at least three accomplices of the well-known extortion gang LockBit were arrested in Poland and Ukraine. These arrests followed the dismantling of the LockBit dark web infrastructure used by the group to threaten its victims and publish stolen data in the event of non-payment of ransom.
Ukrainian law enforcement officers reported the arrest of a "father and son" in the city of Ternopil, whose actions affected the lives of people, businesses, government agencies and medical institutions in France. During the searches, mobile phones and computer equipment allegedly used for cyber attacks were seized.
Meanwhile, in Warsaw, Poland, police arrested a 38-year-old man charged with a number of crimes and has already been handed over to the prosecutor's office. Details of the punishment for those arrested are currently not specified, but additional arrests are expected based on intelligence about those involved in LockBit and the crimes they committed.
In addition, the US Department of Foreign Affairs yesterday announced a $15 million reward for information leading to the arrest or conviction of any member of the LockBit group. Earlier, the US Department of Justice also filed charges against two other alleged members of LockBit — Artur Sungatov and Ivan Kondratiev, who are also already sanctioned by the US Treasury Department.
During Operation Kronos, at least 200 cryptocurrency accounts linked to the LockBit criminals were seized and 34 servers were disabled in various countries, including the Netherlands, Germany, Finland, France, Switzerland, Australia, the United States and the United Kingdom.
LockBit, which has been operating under the RaaS model since 2019, has become the most active ransomware group in the world, committing almost 2,300 attacks and receiving over $120 million in ransoms. The group is known for attacking medical facilities, including Canada's largest children's hospital and the medical system in Pennsylvania and New Jersey.
In the future, we will probably hear more about the arrests of former members of the LockBit gang, as this "cybercrime tangle" has just begun to unravel. Law enforcement officials still have a lot of work to do, which will definitely lead to a reduction in malicious hacking operations and show cyber bandits from around the world that international cooperation is working effectively enough for justice to finally catch up with violators of the digital order.
As part of the international operation Kronos, which began on Monday, February 19, at least three accomplices of the well-known extortion gang LockBit were arrested in Poland and Ukraine. These arrests followed the dismantling of the LockBit dark web infrastructure used by the group to threaten its victims and publish stolen data in the event of non-payment of ransom.
Ukrainian law enforcement officers reported the arrest of a "father and son" in the city of Ternopil, whose actions affected the lives of people, businesses, government agencies and medical institutions in France. During the searches, mobile phones and computer equipment allegedly used for cyber attacks were seized.
Meanwhile, in Warsaw, Poland, police arrested a 38-year-old man charged with a number of crimes and has already been handed over to the prosecutor's office. Details of the punishment for those arrested are currently not specified, but additional arrests are expected based on intelligence about those involved in LockBit and the crimes they committed.
In addition, the US Department of Foreign Affairs yesterday announced a $15 million reward for information leading to the arrest or conviction of any member of the LockBit group. Earlier, the US Department of Justice also filed charges against two other alleged members of LockBit — Artur Sungatov and Ivan Kondratiev, who are also already sanctioned by the US Treasury Department.
During Operation Kronos, at least 200 cryptocurrency accounts linked to the LockBit criminals were seized and 34 servers were disabled in various countries, including the Netherlands, Germany, Finland, France, Switzerland, Australia, the United States and the United Kingdom.
LockBit, which has been operating under the RaaS model since 2019, has become the most active ransomware group in the world, committing almost 2,300 attacks and receiving over $120 million in ransoms. The group is known for attacking medical facilities, including Canada's largest children's hospital and the medical system in Pennsylvania and New Jersey.
In the future, we will probably hear more about the arrests of former members of the LockBit gang, as this "cybercrime tangle" has just begun to unravel. Law enforcement officials still have a lot of work to do, which will definitely lead to a reduction in malicious hacking operations and show cyber bandits from around the world that international cooperation is working effectively enough for justice to finally catch up with violators of the digital order.
