Lockbit Group Admin Reveals Darknet Infrastructure Compromise

Recent reports indicate that on the dark corners of the internet, the notorious LockBit ransomware operation has resurfaced to continue its extortion activities. This resurgence comes shortly after international law enforcement authorities seized control of its previous infrastructure.

Lockbit, known for its data leakage portal, has now relocated to a new online address within the network, allowing the cybercriminals behind the operation to resume their illicit activities.

The use of Tor, a network that enables anonymous and encrypted data transfer, remains prevalent in such illicit operations. While many ordinary users turn to Tor to maintain anonymity or bypass regional restrictions, cybercriminals rely on it to cover their digital tracks and evade law enforcement scrutiny.

/Reports, release notes, official announcements.