SOCRadar® Cyber Intelligence Inc. | LockBit Allegedly DDoSed After Leaking Entrust’s Data
Home

Resources

Blog
Aug 22, 2022
4 Mins Read

LockBit Allegedly DDoSed After Leaking Entrust’s Data

IT security company Entrust suffered a cyberattack on June 18. Attackers gained unauthorized access to the company’s network to reach internal data. Despite the theft of some files, Entrust’s workflow was unaffected. The company later notified their customers about the breach, saying they are still investigating and will provide further information.

Entrust made a statement about the incident.
Entrust made a statement about the incident. (Source: Twitter)

LockBit Claimed They Are Behind the Entrust Attack 

Dominic Alvieri, a security researcher, reported that LockBit had published a specific data publication page for Entrust on their leak site and promised to expose all of the stolen information the following evening.

LockBit’s Entrust leak page
LockBit’s Entrust leak page

Given that LockBit promises to make all data public, it can be said that Entrust has not engaged in negotiations with the ransomware operation or is unwilling to agree with its demands. 

What Has Been Leaked So Far? 

On August 9, LockBit began revealing pieces of Entrust’s stolen data. The initial leak was only some screenshots that hinted at the documents that would soon be leaked.

According to Alvieri, who has been monitoring the breach, accounting and legal files and marketing spreadsheets were among the information that was exposed

LockBit’s sites went offline a while after they started leaking the data. The threat actors behind the ransomware group claimed it was a DDoS attack related to their controversy with Entrust.

(Source: White Oak Security)

With its public-facing operation LockBitSupp, LockBit is one of the most active ransomware organizations. 

LockBit 3.0, which included new encryptors built on the BlackMatter source code, new payment methods, new extortion tactics, and the first ransomware bug bounty program, was launched in June.

Mitigation Methods 

It is advised for security and network experts to stay current with the threat actor’s development and TTPs, as well as monitor the software and firmware updates done regularly.

Reviewing accounts and privileges is also necessary. Accounts or privileges that are not required anymore should be removed. Implement security measures and have a dedicated SOC team to increase visibility into all digital assets. Ensure you have a backup plan to prevent a disruption in workflow due to any cyber incident, including ransomware attacks. 

LockBit TTPs

  • T1107 – File Deletion
  • T1055 – Process Injection
  • T1112 – Modify Registry
  • T1215 – Kernel Modules and Extensions
  • T1060 – Registry Run Keys / Start Folder
  • T1179 – Hooking
  • T1055 – Process Injection
  • T1179 – Hooking
  • T1124 – System Time Discovery
  • T1046 – Network Service Scanning
  • T1083 – File and Directory Discovery
  • T1016 – System Network Configuration Discovery
  • T1012 – Query Registry
  • T1082 – System Information Discovery
  • T1057 – Process Discovery
  • T1063 – Security Software Discovery
  • T1047 – Windows Management Instrumentation
  • T1035 – Service Execution
  • T1075 – Pass the Hash

LockBit IoCs

SHA256:

  • 0d38f8bf831f1dbbe9a058930127171f24c3df8dae81e6aa66c430a63cbe0509
  • 9a34909703d679b590d316eb403e12e26f73c8e479812f1d346dcba47b44bc6e
  • 39c363d01fb5cd0ed3eeb17ca47be0280d93a07dda9bc0236a0f11b20ed95b4c
  • 80e8defa5377018b093b5b90de0f2957f7062144c83a09a56bba1fe4eda932ce
  • 391a97a2fe6beb675fe350eb3ca0bc3a995fda43d02a7a6046cd48f042052de5
  • 506f3b12853375a1fbbf85c82ddf13341cf941c5acd4a39a51d6addf145a7a51
  • 742489bd828bdcd5caaed00dccdb7a05259986801bfd365492714746cb57eb55 
  • a56b41a6023f828cccaaef470874571d169fdb8f683a75edd430fbd31a2c3f6e
  • b951e30e29d530b4ce998c505f1cb0b8adc96f4ba554c2b325c0bd90914ac944
  • c6cf5fd8f71abaf5645b8423f404183b3dea180b69080f53b9678500bab6f0de
  • d61af007f6c792b8fb6c677143b7d0e2533394e28c50737588e40da475c040ee 
  • f9b9d45339db9164a3861bf61758b7f41e6bcfb5bc93404e296e2918e52ccc10
  • fd98e75b65d992e0ccc64e512e4e3e78cb2e08ed28de755c2b192e0b7652c80a