Ransomware News

The Infamous Ransomware LockBit 3.0 Group Hits: etisalat.ae in a recent cyber attack, raising concerns about cybersecurity vulnerabilities. To stay ahead of emerging threats, fortify your online security with the HookPhish Dark Web Monitoring platform. Explore HookPhish Dark Web Monitoring.

image 11
LockBit 3.0 Ransomware
Victim Nameetisalat.ae
Victim Logo
(if available)
 
DescriptionEmirates Telecommunications Group Company PJSC, doing business as etisalat by e&, is an UAE state-owned telecommunications company. It is the 18th largest mobile network operator in the world by number of subscribers.
Uploaded Date16 FEB, 2024 13:57 UTC
Dark Web Post Updated16 FEB, 2024 13:58 UTC
Publish Date of Files if Ransom is not Paid16 Apr, 2024 14:57:54 UTC


Lockbit Ransomware Group

LockBit is a ransomware group and a ransomware-as-a-service (RaaS) provider that has been active since September 2019. LockBit uses malware to encrypt and steal data from organizations across various sectors and regions, and demands payment in cryptocurrency for its decryption and return. LockBit also threatens to publish the stolen data online if the ransom is not paid. LockBit is known for its fast encryption speed, self-spreading capability, and double extortion technique.

Citations:

Disclaimer: HookPhish does not engage in the exfiltration, downloading, taking, hosting, viewing, reposting, or disclosure of any files or stolen information. Any legal concerns regarding the content should be directed at the attackers, not HookPhish. This blog is dedicated to posting editorial news, alerting readers about companies falling victim to ransomware attacks. HookPhish has no affiliation with ransomware threat actors or groups, and it does not host infringing content. The information on this page is automatically generated and redacted, sourced directly from the Onion Dark Web Tor Blogs pages.

Leave a comment

Your email address will not be published. Required fields are marked *