{"id":128822,"date":"2025-05-08T08:22:16","date_gmt":"2025-05-08T08:22:16","guid":{"rendered":"http:\/\/cryptospotters.net\/?p=128822"},"modified":"2025-05-08T08:22:16","modified_gmt":"2025-05-08T08:22:16","slug":"60k-bitcoin-addresses-leaked-as-lockbit-ransomware-gang-gets-hacked","status":"publish","type":"post","link":"http:\/\/cryptospotters.net\/?p=128822","title":{"rendered":"60K Bitcoin addresses leaked as LockBit ransomware gang gets hacked"},"content":{"rendered":"<p>Source: Cointelegraph.com NewsAlmost 60,000 Bitcoin addresses tied to LockBit\u2019s ransomware infrastructure were leaked after hackers breached the group\u2019s dark web affiliate panel.\u00a0<br \/>\nThe leak included a MySQL database dump shared publicly online. It contained crypto-related information that could help blockchain analysts trace the group\u2019s illicit financial flows.<br \/>\nRansomware is a type of malware used by malicious actors. It locks its target\u2019s files or computer systems, making them inaccessible. The attackers typically demand a ransom payment, often in digital assets like Bitcoin (BTC), in exchange for a decryption key to unlock the files.<br \/>\nLockBit is one of the most notorious crypto ransomware groups. In February 2024, 10 countries launched a joint operation to disrupt the group, saying that the organization had caused billions in damages to key infrastructure.\u00a0<br \/>\nSource: ReyXBFNo Bitcoin private keys leaked<br \/>\nWhile almost 60,000 Bitcoin wallets were leaked, no private keys were included. One X user shared a conversation with a LockBit operator, confirming the breach. However, the LockBit person said no private keys or data were lost.\u00a0<br \/>\nDespite this, analysts at Bleeping Computer said the database contained 20 tables, including a \u201cbuilds\u201d table. This included individual ransomware builds created by the organization\u2019s affiliates. The data also identified some of the target companies for the builds.\u00a0<br \/>\nIn addition, the leaked database also included a \u201cchats\u201d table. This table contained over 4,400 negotiation messages between victims and the ransomware organization.\u00a0<br \/>\nRelated: Crypto crime in 2024 likely exceeded $51B, far higher than reported: Chainalysis<br \/>\nLockBit hack tied to Everest ransomware breach<br \/>\nIt\u2019s unclear who was behind the breach and how they got into LockBit\u2019s operations, but Bleeping Computer analysts said the message used in the Everest ransomware site breach matched the one used in LockBit. The analysts suggested that there may be a link between the two incidents.\u00a0<br \/>\nThe breach highlighted the role that crypto plays in the ransomware economy. Each victim is usually assigned an address to pay their ransom, allowing the affiliates to monitor payments while attempting to obscure ties to their main wallets.\u00a0<br \/>\nThe exposure of the addresses allows law enforcement and blockchain investigators to track patterns and potentially link past ransom payments to known wallets.\u00a0<br \/>\nMagazine: Adam Back says Bitcoin price cycle \u201910x bigger\u2019 but will still decisively break above $100K<a href=\"https:\/\/cointelegraph.com\/news\/lockbit-ransomware-breach-bitcoin-addresses-leaked?utm_source=rss_feed&amp;utm_medium=rss&amp;utm_campaign=rss_partner_inbound\" target=\"_blank\" class=\"feedzy-rss-link-icon\" rel=\"noopener\">Read More<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Source: Cointelegraph.com NewsAlmost 60,000 Bitcoin addresses tied to LockBit\u2019s ransomware infrastructure were leaked after hackers breached the group\u2019s dark web affiliate panel.\u00a0 The leak included a MySQL database dump shared&hellip; <\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[5],"tags":[],"_links":{"self":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/posts\/128822"}],"collection":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=128822"}],"version-history":[{"count":0,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/posts\/128822\/revisions"}],"wp:attachment":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=128822"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=128822"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=128822"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}