'Don't do crime, crime is bad' — Hack on ransomware gang LockBit exposes 59,975 Bitcoin addresses and thousands of victim negotiations: report
Quick Take The LockBit ransomware gang has suffered a data breach after its dark web affiliate panels were defaced and replaced with a message linking to a leaked database dump. Bitcoin addresses, public keys, and victim negotiation messages were exposed, alongside other data — but no private keys.

Ransomware gang LockBit has been on the receiving end of a data leak of its own, exposing 59,975 Bitcoin addresses, public keys, and 4,442 negotiation messages with victims following a recent hack.
LockBit is a notorious cybercriminal group that runs a Ransomware-as-a-Service operation, developing tools and infrastructure for affiliates who carry out attacks. Like most ransomware groups, it demands payment in cryptocurrencies — typically Bitcoin (BTC) or Monero (XMR) — with victims instructed to send funds to designated wallet addresses to receive decryption keys or avoid data leaks. Affiliates often launder the proceeds using mixers, cross-chain swaps, or privacy coins, attempting to evade detection.
LockBit's dark web affiliate panels were defaced and replaced with a message linking to a database dump, which stated, "Don't do crime CRIME IS BAD xoxo from Prague," cybersecurity publication Bleeping Computer reported .
First noted by the threat actor, Rey, BleepingComputer's analysis of the leaked LockBit database found 20 tables, with some revealing details. One table lists nearly 60,000 Bitcoin addresses, likely a mix of addresses used by the gang's affiliates and infrastructure, while another shows ransomware builds linked to specific targets. There are also configuration details for attacks, such as which servers to skip or files to encrypt. A chat log includes over 4,400 messages between the ransomware operation and victims, and a user table names 75 admins and affiliates — with passwords stored in plain text, including examples like "Weekendlover69" and "Lockbitproud231."
No private keys were leaked
A LockBit operator known as "LockBitSupp" confirmed the breach to Rey, stating that no private keys were leaked.
According to Bleeping Computer, the database appears to have been dumped around April 29, based on the MySQL timestamp and the latest chat record. While it's unclear who carried out the breach or how, the defacement message matches one used in a recent attack on Everest ransomware's dark web site, suggesting a possible link. The server was also running PHP 8.1.2, which is vulnerable to CVE-2024-4577 — a critical flaw that can allow remote code execution, the outlet said.
In February 2024, Operation Cronos — an international law enforcement effort — dismantled LockBit's infrastructure, seizing 34 servers, stolen data, cryptocurrency addresses, 1,000 decryption keys, and its affiliate panel. Although LockBit later rebuilt and resumed operations, the group suffered another major setback in May last year, when U.S. authorities unmasked and indicted its ringleader, Dmitry Khoroshev, on 26 criminal counts. Alleged to have earned $100 million from ransom payments, Khoroshev faces sanctions, asset freezes, and a $10 million U.S. bounty for his arrest.
Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.
You may also like
New spot margin trading pair — HOLO/USDT!
FUN drops by 32.34% within 24 hours as it faces a steep short-term downturn
- FUN plunged 32.34% in 24 hours to $0.008938, marking a 541.8% monthly loss amid prolonged bearish trends. - Technical breakdowns, elevated selling pressure, and forced liquidations highlight deteriorating market sentiment and risk-off behavior. - Analysts identify key support below $0.0080 as critical, with bearish momentum confirmed by RSI (<30) and MACD indicators. - A trend-following backtest strategy proposes short positions based on technical signals to capitalize on extended downward trajectories.

OPEN has dropped by 189.51% within 24 hours during a significant market pullback
- OPEN's price plummeted 189.51% in 24 hours to $0.8907, marking its largest intraday decline in history. - The token fell 3793.63% over 7 days, matching identical monthly and yearly declines, signaling severe bearish momentum. - Technical analysts cite broken support levels and lack of bullish catalysts as key drivers of the sustained sell-off. - Absence of stabilizing volume or reversal patterns leaves the market vulnerable to further downward pressure.

New spot margin trading pair — LINEA/USDT!
Trending news
MoreCrypto prices
More








