LockBit 4.0 Leak Exposes Disorganization in Ransomware-as-a-Service Operations
Summary
Hide ▲
Show ▼
In May 2025, a leak of LockBit's 4.0 affiliate panel revealed significant disorganization and chaos within the ransomware-as-a-service (RaaS) ecosystem. The leak exposed thousands of chats between affiliates and victims, highlighting inconsistent professionalism, ignored rules, and economic inconsistencies. This disorganization makes ransomware attacks harder to predict and defend against, as affiliates operate with little oversight and varying levels of reliability. The leak included over 4,000 chat messages, thousands of ransomware builds, internal user tags, and cryptowallet data. Affiliates were found to ignore victims, deliver broken decryption tools, and even attack prohibited targets, including Russian state entities. The economic operations were also unclear, with only a fraction of the Bitcoin wallets tied to extortion attempts receiving funds. The disorganization within RaaS groups complicates incident response planning and erodes the perceived value of paying ransoms. It also incentivizes recklessness among affiliates, who may take bigger risks with minimal consequences. The future of RaaS is expected to involve more infighting and a shift towards shorter, less predictable attacks, making threat intelligence and attribution more challenging.
Timeline
-
13.08.2025 17:00 📰 1 articles · ⏱ 1mo ago
LockBit 4.0 Affiliate Panel Leak Reveals Disorganization in RaaS Operations
On May 7, 2025, LockBit's 4.0 affiliate panel was compromised, leading to a data dump of over 4,000 chat messages, thousands of ransomware builds, internal user tags, and cryptowallet data. The leak exposed significant disorganization and chaos within the RaaS ecosystem, with affiliates operating with little oversight and varying levels of professionalism. This disorganization makes ransomware attacks harder to predict and defend against, complicating incident response planning and eroding the perceived value of paying ransoms.
Show sources
- What the LockBit 4.0 Leak Reveals About RaaS Groups — www.darkreading.com — 13.08.2025 17:00
Information Snippets
-
LockBit's 4.0 affiliate panel was compromised on May 7, 2025, leading to a data dump of over 4,000 chat messages, thousands of ransomware builds, internal user tags, and cryptowallet data.
First reported: 13.08.2025 17:00📰 1 source, 1 articleShow sources
- What the LockBit 4.0 Leak Reveals About RaaS Groups — www.darkreading.com — 13.08.2025 17:00
-
The leak revealed that LockBit affiliates operate with little oversight and varying levels of professionalism.
First reported: 13.08.2025 17:00📰 1 source, 1 articleShow sources
- What the LockBit 4.0 Leak Reveals About RaaS Groups — www.darkreading.com — 13.08.2025 17:00
-
Affiliates ignored victims, delivered broken decryption tools, and attacked prohibited targets, including Russian state entities.
First reported: 13.08.2025 17:00📰 1 source, 1 articleShow sources
- What the LockBit 4.0 Leak Reveals About RaaS Groups — www.darkreading.com — 13.08.2025 17:00
-
Only 19 out of 159 Bitcoin wallets tied to extortion attempts received funds, indicating economic inconsistencies within the operation.
First reported: 13.08.2025 17:00📰 1 source, 1 articleShow sources
- What the LockBit 4.0 Leak Reveals About RaaS Groups — www.darkreading.com — 13.08.2025 17:00
-
The disorganization within RaaS groups makes ransomware attacks harder to predict and defend against, complicating incident response planning.
First reported: 13.08.2025 17:00📰 1 source, 1 articleShow sources
- What the LockBit 4.0 Leak Reveals About RaaS Groups — www.darkreading.com — 13.08.2025 17:00
-
The future of RaaS is expected to involve more infighting, shorter attacks, and increased challenges in threat intelligence and attribution.
First reported: 13.08.2025 17:00📰 1 source, 1 articleShow sources
- What the LockBit 4.0 Leak Reveals About RaaS Groups — www.darkreading.com — 13.08.2025 17:00
Similar Happenings
Supply Chain Attack on npm Packages with Billions of Weekly Downloads
A supply chain attack compromised multiple npm packages with over 2.6 billion weekly downloads. Attackers injected malicious code into these packages after hijacking a maintainer's account via phishing. The malware targets web-based cryptocurrency transactions, redirecting them to attacker-controlled wallets. The attack was detected and mitigated by the NPM team, who removed the malicious versions within two hours. The phishing campaign targeted multiple maintainers, using a fake domain to trick them into updating their 2FA credentials. The malicious code operates by hooking into JavaScript functions and wallet APIs, intercepting and altering cryptocurrency transactions. The attack impacts users who installed the compromised packages during a specific time window and have vulnerable dependencies. The attack targeted Josh Junon, also known as Qix, who received a phishing email mimicking npm. The phishing email prompted the maintainer to enter their username, password, and 2FA token, which were stolen via an adversary-in-the-middle (AitM) attack. The attack affected 20 packages, including ansi-regex, chalk, debug, and others, with over 2 billion weekly downloads. The malware intercepts cryptocurrency transaction requests by computing the Levenshtein distance to swap the destination wallet address. The payload hooks into window.fetch, XMLHttpRequest, and window.ethereum.request, along with other wallet provider APIs. The attack also compromised another maintainer, duckdb_admin, to distribute the same wallet-drainer malware. The affected packages from the second maintainer include @coveops/abi, @duckdb/duckdb-wasm, and prebid, among others. The attack impacted roughly 10% of all cloud environments. The attackers diverted five cents worth of ETH and $20 worth of a virtually unknown memecoin. The attacker’s wallet addresses holding significant amounts have been flagged, limiting their ability to convert or use the funds.
Malicious nx Packages Exfiltrate 2,349 GitHub, Cloud, and AI Credentials
A supply chain attack on the nx build system allowed attackers to publish malicious versions of the popular npm package and auxiliary plugins. These versions contained data-gathering capabilities that exfiltrated 2,349 credentials from GitHub, cloud, and AI services. The attack occurred on August 26, 2025, affecting multiple versions of the nx package and related plugins. The compromised packages were removed from the npm registry, and users were advised to rotate credentials and check for malicious modifications in their systems. The malicious packages scanned file systems, collected credentials, and posted them to GitHub repositories under the users' accounts. The attack exploited a vulnerable workflow introduced on August 21, 2025, which allowed for arbitrary command execution and elevated permissions. The attack took approximately four hours from start to finish, resulting in the exfiltration of around 20,000 sensitive files. The attackers used AI-powered CLI tools to dynamically scan for high-value secrets and modified shell startup files to crash the system upon terminal session opening. A second attack wave was identified on August 28, 2025, affecting over 190 users/organizations and over 3000 repositories. The second wave involved making private repositories public and creating forks to preserve data. The attack unfolded in three distinct phases affecting 2,180 accounts and 7,200 repositories. The first phase impacted 1,700 users and leaked over 2,000 unique secrets. The second phase compromised 480 accounts and exposed 6,700 private repositories. The third phase targeted a single organization, publishing an additional 500 private repositories.
AI-Powered Cyberattacks Targeting Critical Sectors Disrupted
Anthropic disrupted a sophisticated AI-powered cyberattack campaign in July 2025. The operation, codenamed GTG-2002, targeted 17 organizations across healthcare, emergency services, government, and religious institutions. The attacker used Anthropic's AI-powered chatbot Claude to automate theft and extortion, threatening to expose stolen data publicly to extort ransoms ranging from $75,000 to $500,000 in Bitcoin. The attacker employed Claude Code on Kali Linux to automate various phases of the attack cycle, including reconnaissance, credential harvesting, and network penetration. The AI tool was also used to craft bespoke versions of the Chisel tunneling utility, disguise malicious executables, and organize stolen data for monetization. The attacker used Claude Code to create scanning frameworks using a variety of APIs, provide preferred operational TTPs, and perform real-time assistance with network penetrations. The AI tool was also used to create obfuscated versions of the Chisel tunneling tool, develop new TCP proxy code, analyze exfiltrated financial data to determine ransom amounts, and generate visually alarming HTML ransom notes. The attacker used AI to make tactical and strategic decisions, adapt to defensive measures in real-time, and create customized ransom notes and extortion strategies. The attacker's activities led Anthropic to develop a tailored classifier and new detection method to prevent future abuse. The operation represents a shift to 'vibe hacking,' where threat actors use LLMs and agentic AI to perform attacks.
AI-Powered Ransomware 'PromptLock' Under Development
A new AI-powered ransomware strain named 'PromptLock' has been discovered by ESET researchers. This ransomware uses an AI model to generate scripts on the fly, making it difficult to detect. The malware is currently in development and has not been observed in active attacks. It is designed to exfiltrate files, encrypt data, and potentially destroy files. The ransomware was uploaded to VirusTotal from the United States and is written in the Go programming language, with variants for Windows, Linux, and macOS systems. The Bitcoin address associated with PromptLock appears to belong to Satoshi Nakamoto. PromptLock uses the SPECK 128-bit encryption algorithm to lock files and can generate custom notes based on the files affected and the type of infected machine.
CISA and partners respond to cyber attack on Nevada state services
On August 24, 2025, a ransomware attack targeted the state of Nevada, impacting essential services and leading to data theft. The Cybersecurity and Infrastructure Security Agency (CISA) and its partners are providing real-time incident response to assist in restoring critical services and rebuilding systems. The attack's origins are under investigation. CISA's Threat Hunting teams are actively examining state networks to identify the full scope of the situation and mitigate threats. The Federal Bureau of Investigation (FBI) is assisting in the investigation, and the Federal Emergency Management Agency (FEMA) is advising on emergency response grants and other available assistance. The attack on Nevada is part of a broader trend of ransomware attacks on local governments, exacerbated by federal budget and staffing cuts.