Massive Leak Exposes 60,000 Bitcoin Addresses Linked to LockBit Ransomware Group

May 8, 2025
Massive Leak Exposes 60,000 Bitcoin Addresses Linked to LockBit Ransomware Group
  • A significant breach has exposed nearly 60,000 Bitcoin addresses linked to the notorious LockBit ransomware group, following a hack of their dark web affiliate panel.

  • The breach was accompanied by a defacement message declaring, 'Don't do crime CRIME IS BAD xoxo from Prague,' and included a download link for a database file.

  • This leaked database contains 20 tables with critical information about LockBit's ransomware builds and the companies they targeted.

  • Despite this setback, LockBit has managed to continue its operations and recruitment, raising concerns about its future in the wake of the breach.

  • The incident underscores the potential for internal threats within ransomware operations, which can pose greater risks than external law enforcement actions.

  • This breach highlights the urgent need for enhanced cybersecurity measures in the cryptocurrency sector, reflecting a broader trend of increasing cybercrime.

  • The leaked data is expected to assist law enforcement and cybersecurity researchers in identifying victims and tracking ransom payments, potentially revealing key affiliates.

  • In a twist, LockBit has offered a bounty for information on the hacker, whom they suspect may be linked to the defacement message.

  • The database dump appears to have occurred around late April 2025, based on timestamps and chat records found in the leak.

  • Investigations revealed that the breach exploited a critical vulnerability in the PHP version used by LockBit's server, allowing access to their backend systems.

  • This breach poses significant challenges to LockBit's reputation and raises questions about the group's long-term viability, echoing the fate of other ransomware organizations that have faced similar leaks.

  • The leak not only exposes LockBit's operations but also serves as a reminder of the ongoing battle between cybersecurity measures and cybercriminal activities.

Summary based on 12 sources


Get a daily email with more Cybersecurity stories

More Stories