DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

After denying responsibility for the Royal Mail attack, LockBit discovers that one of their affiliates was responsible.

Posted on January 14, 2023 by Dissent

The U.K.’s Royal Mail was the victim of a cyberattack that significantly impacted international delivery services. But was this attack the work of LockBit 3.0 or not?

Those who saw the ransom note said the links in the note pointed to LockBit’s leak site and their chat negotiation site. But as Bleeping Computer reported,  the “decryptor ID” to login to the negotiations chat reportedly did not work.

When asked at the time, LockBitSupp, the public face of LockBit, told Bleeping Computer that LockBit was NOT responsible for the attack, and that it was just others using their leaked builder.

What a difference a day or two makes, though.

After repeating the denial on a popular Russian-language forum and saying that since there might not be a real decryptor, there was no reason for Royal Mail to pay any ransom demand,  LockBitSupp turned around today and announced that he had identified the affiliate who was responsible for the attack and that he was a “Top 10” affiliate who would provide a decryptor and delete any stolen data if any ransom demand was paid.

LockBit posts first deny, then acknowledge that LockBit was responsible for the Royal Mail attack.
LockBitSupp’s posts yesterday and today (in Russian). Image: DataBreaches.net.
LockBit posts first deny, then acknowledge that LockBit was responsible for the Royal Mail attack.
LockBitSupp’s posts yesterday and today (in English). Image: DataBreaches.net.

As of publication, the incident does not appear on LockBit’s leak site, and there have been no public claims yet as to how much data might have locked or exfiltrated. Nor is there any information on how much ransom is demanded and whether the Royal Mail is negotiating with the attacker(s) at all.


Related:

  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Confidence in ransomware recovery is high but actual success rates remain low
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
Category: Breach IncidentsMalware

Post navigation

← The Unexpected Effect of the Introduction of Mandatory Breach Notification Requirements in Québec
Sorry, Not Sorry: Guccifer, the Hacker Who Launched Clinton Email Flap, Speaks Out After Nearly a Decade Behind Bars →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • CrowdStrike catches insider feeding information to ScatteredLapsus$Hunters
  • Two suspected Scattered Spider hackers plead not guilty over Transport for London cyberattack
  • Attleboro investigating ‘cybersecurity incident’ impacting city’s IT systems
  • Fired techie admits sabotaging ex-employer, causing $862K in damage
  • Threat actors have reportedly launched yet another campaign involving an application connected to Salesforce
  • Russian hackers target IVF clinics across UK used by thousands of couples
  • US, allies sanction Russian bulletproof hosting services for ransomware support
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • Large medical lab in South Africa suffers multiple data breaches
  • Report released on PowerSchool cyber attack

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Cole v. Quest Diagnostics: The Third Circuit Weighs in on Pixels, Privacy, and Medical Data
  • Closing the Privacy Gap: HIPRA Targets Health Apps and Wearables
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • CIPL Publishes Discussion Paper Comparing U.S. State Privacy Law Definitions of Personal Data and Sensitive Data
  • India’s Digital Personal Data Protection Act 2023 brought into force

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.