Skip to main content

Cybercrime gang Lockbit claims responsibility for ransomware attack on the Industrial and Commercial Bank of China. Since 2019, the group has made a name for itself targeting high-profile institutions and raking in hundreds of millions of dollars as a result. With the group still at large, many are wondering what their motivations are and who will be next.

The cybercrime gang Lockbit has claimed responsibility for a ransomware attack on the Industrial and Commercial Bank of China (ICBC), a world leader in asset lending. While ICBC swiftly regained control of its systems by paying an undisclosed ransom, the attack has left many worried about future similar incidents. First emerging in 2019, the group has quickly made a name for itself with its widespread cyberattacks against high-profile targets.

The name Lockbit refers both to the group and to the ransomware software they have become known for. Ransomware refers to a specific type of malware which is used to infect systems and lock out the primary users unless certain demands are met. These attacks are often initiated through “phishing attempts” where a link or file is sent to a system and opened by an unwitting user, thus allowing the virus to enter the system. Lockbit has developed its own version of this malware and also sells it to other malicious actors on the so-called ‘dark web’. Lockbit ransomware is among the most popular, being used in an estimated 28% of all ransomware attacks in the past year.

Increasingly, groups such as Lockbit have been offering their services to other organizations. This “ransomware-as-a-service” (Raas) complicates matters further, making motivations and identities even murkier. However, many of the high-profile attacks on record have been claimed by Lockbit itself.

Currently, the group has targeted extremely high-profile institutions and businesses. The UK’s Royal Post and Ministry of Defence, Boeing, and Japanese manufacturer Shimano are among the most prominent victims, but the group has also targeted 2000 individuals in the US. Usually, the group demands money in return for system control and victim data. These demands have reportedly made Lockbit more than $100 million in the United States alone, as US banks have reported.

The ICBC has since cleared its systems of Lockbit’s malware, but the threat remains for many others. Strangely, the attack was only targeted against the US branch of the bank, leaving the others branches unaffected. Whether this has any political reason is unclear. In June, the US Department of Justice charged a Russian national for suspected ties to Lockbit attacks around the world. However, the group remains unfazed and its decentralized nature makes it difficult for law enforcement to act.

The Lockbit group remains a mystery to the public. They are said to originate from post-Soviet countries in Eastern Europe. However, their own website claims they are based in the Netherlands. So far, their attacks have had no overt political bias and they have never claimed allegiance to a state or ideology.

Their website also defines certain potential targets as forbidden, such as critical infrastructure, institutions whose compromise could lead to death, and former Eastern bloc nations such as Russia, Lithuania or Moldova. However, these measures do not entirely prevent damage from being done. Earlier this year, a Canadian children’s hospital was victimized by the group, but Lockbit subsequently released an apology and released decryption tools as well as claiming to remove the affiliate responsible for the attack.

With Lockbit still at large, cybersecurity experts advise strong passwords, account management and network monitoring to minimize cybercrime risk. By increasing security, damages from malware can be minimized or maybe even avoided.

Lockbit’s business model is lucrative and effective. With RAAS success on the rise, other dark-web actors are cashing in on this multi-million-dollar criminal enterprise. The public and authorities are wondering who the next target will be.

Picture: 10 November 2023, Asuncion, Paraguay: ICBC logo is displayed on a smartphone in front of the word ransomware, visual representation of open lock and binary code digits. Industrial and Commercial Bank of China (ICBC) financial services arm ICBC Financial Services (ICBC FS) said Thursday that it experienced a ransomware attack that resulted in disruption to certain FS systems. © IMAGO / ZUMA Wire

More News

Illegal vapes are displayed during a press conference No Cure for Popcorn Lung: Vapers and Wor...

Flags of Egypt, Sudan and Ethiopia Egypt and Sudan Reject New Nile Cooperat...

Icebreaker at an Arctic Station “No Arctic Without Russia”: Flashpoint o...

Latest

Flock of Grey Perigord Geese Plucking for Profit

AI Regulations AI Regulation Requires Global Cooperatio...

Secretary of Commerce Howard Lutnick speaks while President Donald Trump meets fishermen and women from American Samoa America First in the South Pacific

Related Articles

Indians protest outside the Pakistan embassy Great Britain’s Not-So-Great Colonial Le...

Dog waiting for adoption Trump Administration Stops Taxpayer Fund...

Elephants closeup shot Do Elephants Hold the Key to Understandi...

Innovation

Novid20's CEOs Miedler and Tockner Novid20 Develops Innovative Software Sol...

Digital Markets Act EU Digital Markets Act To Regulate Unfai...

Clearview Is All Clear With Clearview?

Pioneers

Gregor Mendel Gregor Mendel’s Peas and Premonitions

Hedy Lamarr Hedy Lamarr – Hollywood Star and the ‘Mo...

Ibn Khaldoun Statue and the Dome and Minarets of Ibn Khaldun Mosque Ibn Khaldun’s Asabiyyah or Social Connec...

Cartoon

Cartoon Stariff WarsSTARiff WARS
President Trump's trade war targets China with massive tariffs to 'boost' a flagging economy. By Mark Winter (Chicane), 4 June 2025.

Social Media

Language Articles

Plucking for Profit

Мексика сливает нечистоты в реку Тихуана, загрязняя пляжи Калифорнии

Acuerdo UE-Mercosur: ¿Sueño hecho realidad o pesadilla neoliberal?

美国-刚果民主共和国稀土协议:特朗普总统挑战中国在非洲的主导地位

Dunkle Energie und Dunkle Materie – ESAs Versuch, das Universum zu erklären

يوهان شتراوس الثاني: الذكرى المئوية الثانية لنجم موسيقى الفالس في فيينا

La Suède a encore besoin de livres

WordPress Cookie Notice by Real Cookie Banner