LockBit Hackers Claim ICBC Paid Ransom to End Cyberattack

The United States financial services division of Chinese Bank ICBC was hit by a cyberattack that reportedly affected the trade of the U.S. Treasury on Thursday, November 9. The firm was hit with ransomware from the LockBit cybercriminal group, which has plagued enterprises in recent years. According to the cybercriminal gang responsible for the attack, it was revealed that ICBC paid the ransom to end the attack against its operations.

“They paid a ransom, deal closed,” the LockBit representative told Reuters via Tox, an online messaging app.

The amount paid has not been revealed.

The Industrial and Commercial Bank of China (ICBC), is the world’s largest lender by assets.

Immediately after the attack was detected, ICBC stated that they began “isolating impacted systems to contain the incident,” in a public announcement.

The cyberattack was so disruptive it forced ICBC to continue its operations by USB thumb drives and use Google email accounts since its corporate email system was offline, according to Reuters.

The disruption led to ICBC temporarily owing BNY Mellon $9 billion for unsettled trades.

LockBit Ransomware Strikes Again

LockBit has become the most disruptive, powerful ransomware cybercriminal gang within just three years. They have attacked over 1,700 U.S. entities ranging from city governments, hospitals, and critical infrastructure.

The victim list across the globe of LockBit grows seemingly every day on the dark web, where data is exfiltrated and sold.

Frequently, cybercriminal gangs of less sophistication can leverage the LockBit ransomware tools and are de facto “affiliates” of the primary group, earning commissions and payouts for successful cyberattacks.

Ransomware infects the victim’s network infrastructure and typically demands a cryptocurrency payment to gain access to a decryption tool or token which can then restore IT infrastructure and operations.

While even the Federal Bureau of Investigation strictly recommends not paying ransoms—there is no guarantee that you will be able to decrypt your data and restore operations by paying—many enterprises are left with little choice as the cost of downtime and completely rebuilding infected IT infrastructure is too costly and slow.

This creates a repeatable, scalable business model for cybercriminals knowing that targets more than likely will pay.

You May Also Like

US organizations hit by almost half of all ransomware since 2020

According to new research by NordLocker, American businesses were targeted with nearly…

North Korean hackers target critical infrastructure in X_Trader supply chain attack

North Korean hackers have been using a supply chain attack to target…

Apple iOS 17.3 Introduces Stolen Device Protection

Apple iOS 17.3 has arrived to consumers everywhere, and with it, the…