Connect with us

Hi, what are you looking for?

Tech & Science

Ramifications of LockBit 2.0 ransomware recruitment

The latest ransomware users insiders to cause havoc – businesses need to beware.

The latest ransomware users insiders to cause havoc - businesses need to beware.
The latest ransomware users insiders to cause havoc - businesses need to beware.

Trends suggest the LockBit 2.0 ransomware gang is actively recruiting corporate insiders to break into networks. LockBit ransomware is malicious software designed to block user access to computer systems in exchange for a ransom payment. In practice, LockBit 2.0 is a file-locking code that demands Bitcoins from its victims. File locking is a mechanism that restricts access to a computer file, or to a region of a file, by allowing only one user or process to modify or delete it.

The attacks are sophisticated. LockBit affiliates implement the ‘double extortion’ technique by uploading stolen and sensitive victim information to their dark web site ‘LockBit 2.0’, and threatening to sell and/or release this information if their ransom demands are not met.

Looking into the matter for Digital Journal is Avihai Ben Yossef, Co-Founder and CTO of Cymulate.

According to Yossef we need to see the current situation as a very real threat: “Businesses of all sizes have long had to contend with internal employees divulging company secrets, stealing revenue, and performing other acts that harm the organization.”

Looing to the whys, Yossef finds: “In many cases, this activity was at the request of an external concern promising the employee some form of reward to make their actions feel worthwhile. This news of a ransomware group offering payment for information is shockingly public and visible, but is also just the latest form of a situation that has existed since the first time two companies competed for the same market.”

This situation comes about due to structural weakness with internal security systems. Yossef  finds that: “Many organizations have gaps in permission management and authorization, that results in risk exposure such nefarious activities take advantage of.”

Consequently, he cautions: “Businesses must be wary about what their employees can and cannot do with digital assets. To mitigate risks, one should limit users to the least amount of privilege so that if one of them does sell information, there is a limit of what can be done with it.”

This means, as Yossef recommends with his final advice, making “Sure each person has the specific permissions and access to exactly what he needs to do his or her job.”

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

Business

The United States is on track to lose some $12.5 billion in revenue from foreign tourists this year.

Entertainment

"The ambition and complexity of Grand Theft Auto VI is greater than any previous Rockstar title."

Life

Cinnabon’s Cinnamon Roll Pastry ranks highest overall, with a glycaemic load of 95.25 and an estimated blood sugar spike of 238 mg/dL.

World

The case before the top court involves the Republican leader's bid to end automatic citizenship for children born on American soil.