RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Security OperationsFebruary 22, 2024

Operation Cronos and the LockBit takedown: What we know

The U.S., U.K., Canada and eight partner countries have disrupted the LockBit ransomware group. Here are the key takeaways, along with expert insights. Carolynn van Arsdale

Carolynn van Arsdale, Writer, ReversingLabs.Carolynn van Arsdale
FacebookFacebookXX / TwitterLinkedInLinkedIn

More Blog Posts

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / Twitter
LinkedInLinkedIn
FacebookFacebook
InstagramInstagram
YouTubeYouTube
blueskyBluesky
RSSRSS
Back to Top
blueskyBluesky
Email Us

The United Kingdom’s National Crime Agency (NCA), in collaboration with the U.S., Canada and eight other international partners shared a major update this past Tuesday regarding Operation Cronos, the international disruption campaign created to take down the LockBit ransomware group. The government action successfully compromised LockBit’s “entire criminal enterprise” by infiltrating the group’s network, taking control of its services, and accessing its source code, as well as other important intelligence.

LockBit is considered to be one of the most prolific ransomware groups to date, having targeted a plethora of victims globally — and hauling in more than $90 million in ransom payments from the U.S. alone since 2020.

The successful takedown effort consisted of taking control of the group’s primary administration environment, prohibiting it from building and carrying out further attacks on victims. Operation Cronos also compromised LockBit’s site used for leaking information on the dark web, which was previously used to blackmail victims by threatening to post confidential data. The group’s website is now fully run and controlled by the NCA, and is being used to share vital information.

In addition to the takedown, Operation Cronos accessed all of LockBit’s source code, plus a vast amount of intelligence on the gang’s activities and partnerships with other cybercriminals globally, noted Graeme Biggar, Director General of the NCA:

Through our close collaboration, we have hacked the hackers; taken control of their infrastructure, seized their source code, and obtained keys that will help victims decrypt their systems.

Here’s what we know about the takedown of the LockBit ransomware group, along with expert insights.

Key takeaways: The State of Software Supply Chain Security 2024Get the full reportSee the Webinar discussion

A look at LockBit’s history

LockBit has been active since as early as September 2019, and has rebranded itself several times over the past five years by changing its name and improving its arsenal of tools. As a ransomware-as-a-service group (RaaS), LockBit had an expansive network of cybercriminals, recruited to pull off ransomware attacks using the gang’s proprietary malicious tooling.

The Operation Cronos agencies have expressed that the work toward neutralizing LockBit “does not stop here,” noting that much of this work will include prosecuting cybercriminals affiliated with the group, and seizing more of their operations. On Tuesday morning, Europol arrested two LockBit members and froze more than 200 cryptocurrency accounts. And the U.S. Department of Justice criminally charged two defendants and indicted two Russian nationals — all responsible for carrying out LockBit attacks, the NCA said in a statement.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) said LockBit made up over 15% of all ransomware incidents targeting Australia, Canada, New Zealand and the U.S. in 2022, making it one of the most successful ransomware organizations in the world.

Ransomware doesn’t end with LockBit

While the efforts associated with Operation Cronos are a huge step towards inhibiting international cybercrime, several ransomware groups in the past have risen from the ashes in the form of new groups with the same members, but under different names and with improved tools.

Ashlee Benge, Director of Threat Intelligence at ReversingLabs, said the end of LockBit won’t be the end for ransomware.

These takedowns are impactful in that they disrupt ransomware gang operations for a time, but inevitably, something new will pop up in LockBit’s place.

Ashlee Benge

The Conti ransomware gang, for example, which was once considered to be a leading cybercrime group, ceased its operations after the group’s private chats were leaked by one of its own members out of retaliation for the war in Ukraine. Not long after Conti’s fall, several threat researchers spotted a never-before-seen ransomware group in late 2022 known as Black Basta. By analyzing several of Black Basta’s attacks, experts believed that the group was an offshoot of the original Conti group, based on similarities between both groups’ tactics, techniques and procedures.

Despite the successful Operation Cronos takedown campaign, the track record set by ransomware groups to date likely indicates that an offshoot of LockBit will arise in the future.

Life after LockBit: Tools and best practices are key

Through the efforts of the NCA and the other member agencies of Operation Cronos, millions of LockBit victims worldwide can now access a free decryptor for the ransomware. But for those who have not been hit with LockBit, it’s important to take precautions and practice defensive measures, despite all of this progress.

The utilization of YARA rules can aid threat hunters and researchers in their ability to detect malware such as the LockBit ransomware. ReversingLabs’ open-source YARA rule for LockBit can detect when this ransomware is running on an organization’s network.

ReversingLabs’ Benge said that in addition to the utilization of YARA rules, organizations should continue to bolster their threat intelligence and hunting capabilities in order to prevent malware families such as the LockBit ransomware from infecting their systems in the first place.

As defenders, we have to block 100% of threats, but an attacker only has to be successful in a single attempt out of many. A multi-pronged security approach and incident preparedness strategy are key in fighting against ransomware successfully.

Ashlee Benge

Tags:Security Operations
smiling woman with glasses
Operation Cronos and the LockBit takedown: What we know

Keep learning

  • Get up to speed on the state of software security with RL's Software Supply Chain Security Report 2026. Plus: See the the webinar to discussing the findings.
  • Learn why binary analysis is a must-have in the Gartner® CISO Playbook for Commercial Software Supply Chain Security.
  • Take action on securing AI/ML with our report: AI Is the Supply Chain. Plus: See RL's research on nullifAI and watch how RL discovered the novel threat.
  • Get the report: Go Beyond the SBOM. Plus: See the CycloneDX xBOM webinar.

Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Menu
Request a demo
Post-quantum security

Crypto group ushers in post-quantum security

Here’s a look at the Ethereum Foundation’s new PQC security effort — and why you need to modernize your SecOps.

Learn More about Crypto group ushers in post-quantum security
Crypto group ushers in post-quantum security
Cybercrime-as-a-service

Cybercrime-as-a-service forces a security rethink

With AI-powered tools readily available, sophisticated attacks no longer require sophisticated attackers.

Learn More about Cybercrime-as-a-service forces a security rethink
Cybercrime-as-a-service forces a security rethink
AI adoption guardrails

Why governance is key to safe AI adoption

A new CSA report stresses getting out in front of AI risk — and why it matters for SecOps.

Learn More about Why governance is key to safe AI adoption
Why governance is key to safe AI adoption

Adversarial AI is on the rise: What you need to know

Researchers explain that as threat actors move to AI-enabled malware in active operations, existing defenses will fail.

Learn More about Adversarial AI is on the rise: What you need to know
Adversarial AI is on the rise: What you need to know
Adversarial AI rise