Hack Exposes Nearly 60,000 Bitcoin Addresses Linked to LockBit Ransomware Group
By: crypto news|2025/05/08 19:15:01
0
Share
A major breach has rocked the infamous LockBit ransomware gang, exposing nearly 60,000 Bitcoin addresses after hackers defaced its dark web affiliate panels and leaked a trove of internal data online.The cyberattack, discovered on May 7, 2025, targeted LockBit’s dark web infrastructure, defacing affiliate admin panels and leaking a large internal records database.What Happened?So LockBit just got pwned ... xD pic.twitter.com/Jr94BVJ2DM— Rey (@ReyXBF) May 7, 2025The attackers left behind a message—“Don’t do crime CRIME IS BAD xoxo from Prague”—along with a downloadable MySQL database dump titled paneldb_dump.zip.Initially flagged by threat actor Rey, the breach was swiftly analysed by cybersecurity experts, who uncovered a wealth of information about LockBit’s operations.According to Bleeping Computer report, the leaked data includes a massive collection of ransomware infrastructure details. Most notably, it exposes 59,975 unique Bitcoin addresses linked to LockBit. These addresses are believed to be associated with ransom payments, each typically assigned to individual victims as part of LockBit’s efforts to compartmentalise and obscure the flow of illicit funds. Source: XHowever, LockBit’s operator, “LockBitSupp” confirmed the breach but insisted that no private keys or additional sensitive data were lost.Additional data reveals records of detailed logs of ransomware builds created by LockBit affiliates. These records not only document the technical configurations used in various attacks but also include extensive chat logs, over 4,400 negotiation messages between LockBit operators and their victims. Also among the compromised data were user credentials, including 75 admins and affiliates with access to the affiliate panel, with passwords stored in plaintext.The exact method used to breach LockBit’s infrastructure remains uncertain. However, Bleeping Computer suggests similarities to a recent hack of the Everest ransomware group, raising suspicions of a common attacker or tactic.The report noted that the server was running PHP 8.1.2, which is known to be vulnerable to CVE-2024-4577, a critical exploit that could have enabled remote code execution.LockBit’s Crumbling Empire: Global Crackdown Followed By Leaked DataThe fallout from the breach is likely to be far-reaching. For law enforcement agencies and blockchain forensic teams, the leaked Bitcoin addresses and data offer a new opportunity to trace ransomware payments and potentially identify individuals connected to LockBit. The breach also delivers a severe reputational blow to LockBit, which has already been weakened by Operation Cronos. The coordinated crackdown led by the U.S. Department of Justice, Europol, and law enforcement agencies worldwide in early 2024 temporarily dismantled its infrastructure.The operation has already resulted in the freezing of over 200 cryptocurrency accounts linked to LockBit’s ransomware activities.Authorities have arrested two LockBit actors in Poland and Ukraine, while two affiliates were apprehended and charged in the U.S. The U.S. Treasury’s OFAC also blacklisted ten Bitcoin and Ether addresses tied to the group, with some linked to deposits on exchanges like KuCoin, Binance, and Coinspaid. These sanctions now prohibit U.S. entities from transacting with the individuals or wallets involved.Key infrastructure used by LockBit, including its websites and ransom negotiation panels, was seized in early 2024. More than 1,000 decryption keys were recovered and are being distributed to victims to help them regain access to encrypted data without paying ransoms.A major developer behind LockBit’s tools, Rostislav Panev, was arrested in Israel and awaits extradition to the U.S. Panev allegedly built malware and other software for the group and received over $230,000 in crypto. His defence claims he was unaware of how the tools were used, but authorities say he played a central role in enabling the group’s operations.LockBit, active since 2019, has attacked more than 2,500 victims in 120 countries and reportedly extorted over $120 million globally.The post Hack Exposes Nearly 60,000 Bitcoin Addresses Linked to LockBit Ransomware Group appeared first on Cryptonews.
You may also like

Business Opportunities of Tokenized Stocks
In this article, we will outline the lifecycle of tokenized stocks, analyze the current market landscape, and highlight the emerging business opportunities.

In-depth research report on the Resolv protocol hacking incident, who is the final payer?
This incident reveals a fundamental weakness in Delta's stablecoin - the coupling point between the minting logic and off-chain signatures/oracles is the most vulnerable attack surface of the system. Any capital efficiency design of "1 dollar minted for 1 dollar" must be predicated on extremely rigo...

Crypto Market Sees Large Liquidations: $272 Million in Long Positions Affected
Key Takeaways In the last 24 hours, $272 million worth of contracts were liquidated across the entire crypto…

Whale Increases BTC Shorts and Bets on Crude Oil: A Strategic Crypto Move
Key Takeaways A prominent whale, known as “UnRektCapital,” has strategically escalated its short position in Bitcoin while simultaneously…

Hackers in Brazil Use Fake Google Play Store to Steal Cryptocurrency
Key Takeaways Hackers in Brazil are exploiting fake Google Play Store pages to spread Android malware. Infected devices…

Exchanging 200,000 for nearly 100 million, DeFi stablecoins face another attack
DeFi project teams cannot assume that the modules they control are necessarily secure.

The underlying business agreement of the trillion-dollar Agent economy: Understanding ERC-8183, it's not just about payments, but the future
This article systematically analyzes the technical principles and commercial value of the ERC-8183 protocol from the dimensions of technical architecture, core mechanisms, application scenarios, and ecological collaboration.

When Wall Street's ETH begins to "yield": Looking at the asset properties of Ethereum from BlackRock's ETHB
ETH is undergoing a paradigm shift from a "volatile asset" to a "yield-generating cash flow asset."

The Power of Agency: The Agentic Wallet and the Next Decade of Wallets
In 1984, Apple killed the command line with a mouse. In 2026, Agent is killing the mouse.

Understanding x402 and MPP in One Article: Two Routes for Agent Payments
x402 makes payments within the agreement, while MPP makes system-level payments.

Particle Founder: The entrepreneurial insights I have gained the most from in the past year
Stop lean startup, stop lightning entrepreneurship, and think carefully about what your product aspirations are.

Huang Renxun's latest podcast transcript: The future of Nvidia, the development of embodied intelligence and agents, the explosion of inference demand, and the public relations crisis of artificial intelligence
The competition in the future is not just about whose model is larger or whose computing power is stronger, but also about who understands the industry better, who can embed AI more deeply into real processes, and who can organize these capabilities into a runnable and scalable system.

OKX Ventures Research Report: AI Agent Economic Infrastructure Research Report (Part 1)
The existing infrastructure is hostile to the Agent economy. Agents can think and act independently at the "capability level," but at the "economic level," they are still locked into infrastructure designed for humans.

The migration of settlement rights: B18 and the institutional starting point of on-chain banks
In the traditional system, banks decide the settlement; in the on-chain system, code begins to take over this responsibility.

From Tencent and Circle: Looking at the Simple and Difficult Questions of Investment
The AI narrative continues to ferment, but the recent performance of related stocks varies, with some in the midst of summer and others as if in winter.

The second half of stablecoins no longer belongs to the crypto circle
What Coinbase doesn't want, Mastercard is eager to buy.

Cursor "Shell" Kimi Controversy Reversed: From Copyright Infringement Allegations to Authorized Collaboration, China's Open Source Model Once Again Becomes a Global AI Foundation
Cursor was accused of being based on Kimi K2.5, which sparked controversy, and was later confirmed to be compliant through Fireworks AI due diligence.

The Real Reason Tokens Don't Sell: 90% of Crypto Projects Overlook Investor Relations
Provide an Investor Relations Best Practices Guide for Crypto Projects.
Business Opportunities of Tokenized Stocks
In this article, we will outline the lifecycle of tokenized stocks, analyze the current market landscape, and highlight the emerging business opportunities.
In-depth research report on the Resolv protocol hacking incident, who is the final payer?
This incident reveals a fundamental weakness in Delta's stablecoin - the coupling point between the minting logic and off-chain signatures/oracles is the most vulnerable attack surface of the system. Any capital efficiency design of "1 dollar minted for 1 dollar" must be predicated on extremely rigo...
Crypto Market Sees Large Liquidations: $272 Million in Long Positions Affected
Key Takeaways In the last 24 hours, $272 million worth of contracts were liquidated across the entire crypto…
Whale Increases BTC Shorts and Bets on Crude Oil: A Strategic Crypto Move
Key Takeaways A prominent whale, known as “UnRektCapital,” has strategically escalated its short position in Bitcoin while simultaneously…
Hackers in Brazil Use Fake Google Play Store to Steal Cryptocurrency
Key Takeaways Hackers in Brazil are exploiting fake Google Play Store pages to spread Android malware. Infected devices…
Exchanging 200,000 for nearly 100 million, DeFi stablecoins face another attack
DeFi project teams cannot assume that the modules they control are necessarily secure.