Yazılar

Ransomware Gang Lockbit Reportedly Hacked in Embarrassing Leak

In an ironic twist, Lockbitone of the world’s most notorious ransomware gangs — appears to have fallen victim to a cyberattack of its own, according to security analysts and a rogue message posted on one of the group’s darkweb sites.

On Wednesday, Lockbit’s site was replaced with a taunting message that read:

Don’t do crime. CRIME IS BAD xoxo from Prague
The site also included a link to what appears to be a leaked cache of internal data, potentially containing chats between Lockbit members and their victims.

While Reuters has not independently verified the data, multiple cybersecurity experts have assessed the leak and confirmed its authenticity.

It’s legit,” said Jon DiMaggio, chief security strategist at Analyst1.
Christiaan Beek of Rapid7 noted the leak revealed Lockbit’s indiscriminate targeting — even aggressively pursuing small businesses for minor ransom payouts.
They attack everyone,” he added.

Who hacked Lockbit remains unclear, and some of the group’s associated darkweb infrastructure is currently down, with placeholder messages stating sites will be “working soon.” However, the damage may already be done.

This is not the first time Lockbit has faced disruption. In 2023, U.K. and U.S. authorities, alongside international partners, seized parts of the gang’s infrastructure. At the time, Lockbit quickly resurfaced and defiantly declared,

I cannot be stopped.”
But this latest incident appears more personal — and humiliating.

DiMaggio described the breach as a significant blow to the gang’s operations and credibility:

I think it will hurt them and slow them down.”

Lockbit, once dubbed “the Walmart of ransomwaredue to its prolific activity and reach, now faces a potentially destabilizing turn of events — and an unexpected reminder that even cybercriminals aren’t immune to being hacked.

Google Uncovers New Russian Malware ‘LOSTKEYS’ Linked to Cold River Hacking Group

Google’s Threat Intelligence Group announced Wednesday the discovery of a new malware strain called “LOSTKEYS”, which has been linked to the Russia-based hacking group Cold River, believed to have ties to the Russian Federal Security Service (FSB).

According to Google researcher Wesley Shields, the malware marks a significant expansion in Cold River’s cyber toolkit, with capabilities that include file theft and system reconnaissance, enabling attackers to gather intelligence on high-profile individuals and institutions.

LOSTKEYS represents a new development in the toolset used by Cold River,” Shields stated in a blog post.

Recent Targeting Activity:

  • Attacks observed in January, March, and April 2025

  • Targets include current and former advisers to Western governments, military personnel, NGOs, journalists, think tanks, and individuals connected to Ukraine

  • Cold River continues to pursue espionage goals in line with Russian strategic interests

Background on Cold River:

Cold River gained notoriety for targeting:

  • Three U.S. nuclear research labs in 2022

  • Private email leaks of former British spymaster Richard Dearlove and other pro-Brexit figures

  • Credential theft campaigns targeting NATO governments and NGOs

The Russian embassy in Washington did not immediately respond to requests for comment.

The revelation underscores ongoing concerns about state-sponsored cyber threats emanating from Russia, particularly amid the ongoing war in Ukraine and heightened geopolitical tensions.

CDW Beats Q1 Estimates as Healthcare and Education Drive Hardware, Software Demand

CDW Corp. (CDW.O) exceeded Wall Street expectations for both revenue and profit in the first quarter of 2025, fueled by strong demand from healthcare, education, and public sector clients for IT hardware, software, and related services.

The Vernon Hills, Illinois-based IT distributor reported net sales of $5.20 billion, surpassing the $4.93 billion estimate (LSEG data), as end-markets showed signs of spending resilience despite ongoing economic uncertainty.

While economic uncertainty continues to persist, certain end-markets experienced improved customer spending during the first quarter,” the company said in a statement.

Segment Highlights:

  • Public segment revenue: $1.88 billion, up 10.3% year-over-year

  • Corporate segment revenue: $2.23 billion, up 6.3%

  • Adjusted EPS: $2.15 vs. $1.96 expected

CDW’s public segment—serving sectors like healthcare and educationwas a key driver of growth, while its corporate business remained the largest contributor overall. The company also noted continued demand for desktops, notebooks, mobile devices, cloud solutions, and cybersecurity services.

CDW partners with major vendors such as Cisco, Dell Technologies, HP, and Microsoft, delivering integrated IT solutions to enterprise, government, and institutional clients across the U.S., U.K., and Canada.

The results underscore CDW’s strong market position and ability to navigate industry headwinds, as organizations continue to prioritize digital transformation, remote access tools, and IT infrastructure upgrades.