Lockbit Ransomware Group Claims To Have Pwned Mandiant

This could be interesting if this is true. The Lockbit ransomware group claims to have pwned the market leader in threat intelligence and expertise when it comes to cybersecurity, Mandiant. The news appeared via a Tweet:

Now I don’t know if this is true or not. But it will become clear in the coming days. And if it is true, it will be very embarrassing for Mandiant. And it will send shockwaves through companies that are in Mandiant space.

Chris Olson, CEO of The Media Trust had this to say:

“With Mandiant claiming “we do not have any evidence” to support LockBit’s claim, this is a developing story which we should take with a grain of salt. In the past, LockBit has posted names on its website only to drop them without explanation – it has also stolen data from organizations through a third-party vendor while falsely claiming to have breached its victims directly. Until more information emerges, the Mandiant story may go in either of those directions.

LockBit acts on a ransomware-as-a-service (RaaS) model, meaning the actors who may have initiated this breach cannot be directly identified. This could be a useful tactic for the enemies Mandiant has acquired since it first began operating at the frontlines of global cyberwarfare. In 2013, it implicated Chinese actors in cyber espionage – in 2020, it helped investigate Russian groups responsible for the SolarWinds hack. More recently, it has been tracking the Russia-based cybercriminal group ‘Evil Corp’, which has begun working with LockBit to evade U.S sanctions.

For now, we don’t know if LockBit’s claims are true. But if they are, they could have serious implications for cybersecurity research firms who are increasingly ending up in the crosshairs of global cyber actors.”

I would stay tuned to this space as this will become a real story in the next day or so. Or it may just go away. We’ll have to see which way this goes.

Leave a Reply

Discover more from The IT Nerd

Subscribe now to keep reading and get access to the full archive.

Continue reading