Yazılar

Ransomware Gang Lockbit Reportedly Hacked in Embarrassing Leak

In an ironic twist, Lockbitone of the world’s most notorious ransomware gangs — appears to have fallen victim to a cyberattack of its own, according to security analysts and a rogue message posted on one of the group’s darkweb sites.

On Wednesday, Lockbit’s site was replaced with a taunting message that read:

Don’t do crime. CRIME IS BAD xoxo from Prague
The site also included a link to what appears to be a leaked cache of internal data, potentially containing chats between Lockbit members and their victims.

While Reuters has not independently verified the data, multiple cybersecurity experts have assessed the leak and confirmed its authenticity.

It’s legit,” said Jon DiMaggio, chief security strategist at Analyst1.
Christiaan Beek of Rapid7 noted the leak revealed Lockbit’s indiscriminate targeting — even aggressively pursuing small businesses for minor ransom payouts.
They attack everyone,” he added.

Who hacked Lockbit remains unclear, and some of the group’s associated darkweb infrastructure is currently down, with placeholder messages stating sites will be “working soon.” However, the damage may already be done.

This is not the first time Lockbit has faced disruption. In 2023, U.K. and U.S. authorities, alongside international partners, seized parts of the gang’s infrastructure. At the time, Lockbit quickly resurfaced and defiantly declared,

I cannot be stopped.”
But this latest incident appears more personal — and humiliating.

DiMaggio described the breach as a significant blow to the gang’s operations and credibility:

I think it will hurt them and slow them down.”

Lockbit, once dubbed “the Walmart of ransomwaredue to its prolific activity and reach, now faces a potentially destabilizing turn of events — and an unexpected reminder that even cybercriminals aren’t immune to being hacked.

DOGE Staffer ‘Big Balls’ Linked to Cybercrime Group, Records Show

Edward Coristine, known by his nickname “Big Balls,” a key member of Elon Musk’s DOGE Service team, provided technical support to a cybercrime group involved in illegal activities, including cyberstalking and data trafficking, according to digital records reviewed by Reuters.

Coristine’s Role in DiamondCDN and EGodly

Coristine, a 19-year-old technologist, founded a company named DiamondCDN around 2022, which offered network services. The company was linked to EGodly, a cybercrime ring that boasted about engaging in criminal activities such as stealing data and cyberstalking law enforcement officials. Digital records show that between October 2022 and June 2023, DiamondCDN’s infrastructure was used to support EGodly’s website, dataleak.fun, which was involved in cybercrimes. EGodly publicly thanked DiamondCDN for providing them with DDoS protection and caching systems.

Connection to Government Agencies

Despite these associations, Coristine has been recognized for his work with U.S. government agencies. He is listed as a “senior adviser” at the State Department and the Cybersecurity and Infrastructure Security Agency (CISA). His name also appears in their staff directories, raising concerns about his involvement in securing government networks despite his previous ties to cybercriminals. Coristine describes himself as a “Volunteer (Intern) Plumber” with the U.S. government on his LinkedIn profile.

EGodly’s Cybercrimes and FBI Targeting

EGodly, the group with which Coristine’s company had ties, was known for a variety of cybercrimes, including hijacking phone numbers, breaking into law enforcement email accounts, and stealing cryptocurrency. The group also posted personal information about an FBI agent they targeted for harassment. The group’s members were reportedly involved in the dangerous practice of swatting, which involves making hoax emergency calls to send armed officers to targeted locations. Law enforcement has been aware of EGodly’s activities due to its connection to cybercrime and swatting incidents.

Concerns Over National Security

Nitin Natarajan, former deputy director of CISA, expressed concern over the potential risks posed by Coristine’s past associations with EGodly, noting that it is troubling for someone with such connections to hold a position in government security. This raises questions about the vetting process and the broader implications of such individuals gaining access to sensitive government networks.

Zscaler Raises Annual Revenue Forecast Due to Rising Demand for Cybersecurity Services

Zscaler (ZS.O) raised its revenue forecast for fiscal 2025 on Wednesday, reflecting growing demand for its cloud-based cybersecurity solutions. Shares of the California-based company surged 6% in after-hours trading.

Enterprises are increasingly investing in AI-powered cybersecurity services to combat the rise in digital scams and online hacking, driving sales for companies like Zscaler. As a result, the company now expects annual revenue for fiscal 2025 to fall between $2.64 billion and $2.65 billion, up from its previous forecast of $2.62 billion to $2.64 billion.

Zscaler also raised its adjusted earnings per share forecast to a range of $3.04 to $3.09, up from the previous expectation of $2.94 to $2.99 per share.

“Growing adoption of Zero Trust and AI is driving strong demand for our platform,” said Zscaler CEO Jay Chaudhry, highlighting the increasing reliance on their services for secure cloud access.

The company projected third-quarter revenue between $665 million and $667 million, slightly below the median analyst estimate of $667.4 million.

In the face of rising cybercrimes, data breaches, online scams, and high-profile hacks, businesses are ramping up their investment in cybersecurity. Zscaler posted second-quarter revenue of $647.9 million, exceeding analysts’ forecast of $635.6 million.