Incident Analysis

LockBit Ransomware and Data Exfiltration: Inside the Most Prolific Ransomware Operation

Between 2020 and February 2024, LockBit was the most prolific ransomware operation in the world. The group and its affiliates conducted over 2,000 attacks globally, extorted more than $120 million in ransom payments, and exfiltrated terabytes of corporate data from organisations including Boeing, ICBC (the world's largest bank), Royal Mail, and the UK Ministry of Defence contractor Zaun. On February 20, 2024, Operation Cronos — a coordinated law enforcement action by 10 countries — seized LockBit's infrastructure. But the group attempted to rebuild within days.

2,000+ attacks. $120M+ in ransoms collected. Taken down by 10 countries in Operation Cronos.

The LockBit Double Extortion Model

LockBit operated as a ransomware-as-a-service (RaaS) platform, recruiting affiliates who conducted the actual attacks using LockBit's ransomware tools, negotiation infrastructure, and leak site. The business model was built on double extortion: affiliates would first exfiltrate sensitive data from the victim's network, then deploy LockBit's encryption payload. Victims faced two simultaneous demands — pay to decrypt their files, and pay to prevent publication of stolen data. LockBit's leak site featured a countdown timer for each victim, creating public pressure and media attention that accelerated payment decisions. Affiliates typically retained 75-80% of ransom payments, with the remainder going to the LockBit developers.

  • Step 1: Initial access — typically via phishing, RDP brute force, or purchased credentials
  • Step 2: Lateral movement and privilege escalation across the victim network
  • Step 3: Data exfiltration — sensitive files transferred to attacker-controlled infrastructure
  • Step 4: Ransomware deployment — LockBit 3.0 encrypts files across the network
  • Step 5: Ransom demand with dual leverage — decryption key AND data deletion
  • Step 6: Leak site countdown — public pressure if payment deadline is missed

Major LockBit Victims and Data Exfiltration

LockBit's victim list reads like a Fortune 500 directory. Boeing confirmed a LockBit attack in November 2023 that resulted in data publication on the leak site after the company refused to pay. ICBC — the Industrial and Commercial Bank of China, the world's largest bank by assets — was hit in November 2023, disrupting US Treasury market settlements. Royal Mail was attacked in January 2023, halting international mail services for weeks. Each of these attacks followed the same pattern: data exfiltration first, encryption second, with the stolen data serving as the primary extortion lever when victims had robust backup and recovery capabilities.

  • Boeing (November 2023): Aerospace data published after non-payment; 43GB leaked
  • ICBC (November 2023): US Treasury operations disrupted; ransom reportedly paid
  • Royal Mail (January 2023): International mail halted for weeks; LockBit demanded $80M
  • Zaun/UK MoD (August 2023): Defence contractor data including military site perimeter security
  • Bangkok Airways (2021): 200GB+ passenger data exfiltrated and published
  • Continental AG (2022): 40TB of automotive engineering data stolen

Operation Cronos: The Takedown

On February 20, 2024, Operation Cronos — coordinated by the UK National Crime Agency, FBI, Europol, and law enforcement agencies from 10 countries — seized LockBit's dark web infrastructure, obtained over 1,000 decryption keys, and arrested several affiliates. The operation revealed that LockBit had lied to victims: even after ransom payment, LockBit had not deleted stolen data as promised. Law enforcement found full copies of victim data on seized servers, proving that paying the ransom never guaranteed data deletion. Despite the takedown, the LockBit administrator (known as LockBitSupp) attempted to relaunch operations within days, demonstrating the resilience of decentralised ransomware operations.

Why Traditional Security Fails Against LockBit

LockBit affiliates used a wide range of initial access methods — phishing, RDP brute force, exploiting known vulnerabilities, and purchasing credentials from access brokers. No single preventive control could block all entry vectors. Once inside, affiliates used legitimate system administration tools for lateral movement, making detection difficult. The critical failure point in most LockBit incidents was not initial access — it was the inability to detect and block the data exfiltration phase that occurred between access and encryption. BlackFog's anti-data exfiltration technology operates at exactly this phase, blocking unauthorised outbound data transfers regardless of how the attacker gained entry or what tools they use internally.

Frequently Asked Questions

Is LockBit still operational after Operation Cronos?

The LockBit administrator attempted to rebuild after the February 2024 takedown, but activity has been significantly reduced. Law enforcement identified the administrator as Russian national Dmitry Khoroshev and issued sanctions. However, the RaaS model means former affiliates may operate under new banners.

Did paying LockBit's ransom guarantee data deletion?

No. Operation Cronos revealed that LockBit retained victim data on their servers even after ransom payment and confirmation of "deletion." Law enforcement found complete copies of data from organisations that had paid. This confirms that ransom payment never guarantees data destruction.

How does BlackFog defend against LockBit-style attacks?

BlackFog blocks the data exfiltration phase that precedes encryption in every LockBit attack. By preventing stolen data from reaching attacker infrastructure, BlackFog eliminates the double extortion leverage that makes LockBit profitable. Without exfiltrated data, the attack becomes a recoverable encryption event.

Eliminate double extortion leverage with anti-data exfiltration

Kyanite Blue is an authorised BlackFog partner. We deploy, manage, and support ADX for organisations across every sector.

Get in touch

Featured Product

BlackFog

Learn more

Ready to stop data exfiltration?

Start with a free 30-day BlackFog assessment — 25 devices, no obligation.