*

LOCKBIT 3.0 APT Holds Boeing Information For Ransom

Anthony J Daw
Anthony J Daw
Cybersecurity Specialist, enthusiast of Python 3 & SQL, Hater of Windows PowerShell. Here to write to you about the wonderful world of Cybercrime, Espionage, and Cyberwarfare.

More From Me

What Happened

As of Oct 27 2023, 17:27 UTC, Lockbit 3.0 an APT (Advanced Persistent Threat) has released that they have broken into Boeing’s data servers, and stolen a tremendous amount of sensitive information. They have given until November 2nd for Boeing to reach out, which if they have not in that time, the sensitive information will be released to the public.

For the time being, they have made it clear they will NOT release the lists or samples to protect the company, but CANNOT ensure the safety of the information after the deadline. They haven’t listed public demands, or a ransom price, but its clear once Boeing either reaches out or verifies the validity of the threat through Boeings Cyber team, this will all be negotiated.

This is a structured ransomware attack, where to the public eye Boeing may not even know this is out yet, its in Boeings hands now to prevent the available stolen data from being released, and causing further harm financially, reputation wise and structurally to their company.


More Information on LOCKBIT 3.0

LOCKBIT 3.0 considers themselves the “Robin Hood” of the cyber-organized-crime world holding ties to Russia, and the Netherlands.

This isn’t Lockbits first ransomware attack, they have targeted many smaller corporations and companies through ransomware attacks. Although they are young in the eyes of the cyber-criminal world, as an APT they still show signs of being a major threat. They previously in March of this year attacked Indigo (previously chapters) the major book outlet store, as well as “Commission des services electriques de Montréal” in August a major electrical company out of Quebec, Canada.


 

Latest