{
	"id": "fd61a0a6-e9ce-4af3-97c3-42585b047f56",
	"created_at": "2026-04-06T00:14:16.089207Z",
	"updated_at": "2026-04-10T03:21:09.005886Z",
	"deleted_at": null,
	"sha1_hash": "74cb3597f648ed402f5c7d072caf38ef7ab714d0",
	"title": "LockBit ransomware launches data leak site to double-extort victims",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 1973592,
	"plain_text": "LockBit ransomware launches data leak site to double-extort victims\r\nBy Lawrence Abrams\r\nPublished: 2020-09-16 · Archived: 2026-04-05 19:16:05 UTC\r\nThe LockBit ransomware gang has launched a new data leak site to be used as part of their double extortion strategy to scare\r\nvictims into paying a ransom.\r\nSince the end of 2019, ransomware gangs have adopted a double extortion tactic of stealing unencrypted files before\r\nencrypting the computers on a network.\r\nThe ransomware gangs then use the stolen files and the threat that they will be publicly released on data leak sites as\r\nleverage to get victims to pay a ransom.\r\nhttps://www.bleepingcomputer.com/news/security/lockbit-ransomware-launches-data-leak-site-to-double-extort-victims/\r\nPage 1 of 4\n\n0:00\r\nhttps://www.bleepingcomputer.com/news/security/lockbit-ransomware-launches-data-leak-site-to-double-extort-victims/\r\nPage 2 of 4\n\nVisit Advertiser websiteGO TO PAGE\r\nLockbit data leak site\r\nAccording to cybersecurity intelligence firm Kela, the LockBit ransomware operation posted a link yesterday on a Russian-speaking hacker forum to their new data leak site.\r\nLockBit data leak site\r\nThe data leak site currently contains two victims; an automation parts manufacturer and a shipping company.\r\nLockBit had previously launched a leak site but shut it down around the time they joined the 'Maze Cartel,' and started using\r\nMaze's site to publish stolen files\r\nWith the release of their data leak site, it is unknown if they are breaking away from this 'cartel' or just want a dedicated site\r\nunder their control.\r\nAll ransomware attacks must be considered data breaches as the ransomware operators not only steal the data but also sift\r\nthrough documents to see what they contain.\r\nDue to this, companies need to be transparent about attacks so that employees and customers can adequately protect\r\nthemselves from the risk of exposed data.\r\nWith the release of LockBit's site, there are now a total of seventeen ransomware data leak sites used in the double extortion\r\ntactic.\r\nhttps://www.bleepingcomputer.com/news/security/lockbit-ransomware-launches-data-leak-site-to-double-extort-victims/\r\nPage 3 of 4\n\nAutomated Pentesting Covers Only 1 of 6 Surfaces.\r\nAutomated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the\r\nother.\r\nThis whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic\r\nquestions for any tool evaluation.\r\nSource: https://www.bleepingcomputer.com/news/security/lockbit-ransomware-launches-data-leak-site-to-double-extort-victims/\r\nhttps://www.bleepingcomputer.com/news/security/lockbit-ransomware-launches-data-leak-site-to-double-extort-victims/\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.bleepingcomputer.com/news/security/lockbit-ransomware-launches-data-leak-site-to-double-extort-victims/"
	],
	"report_names": [
		"lockbit-ransomware-launches-data-leak-site-to-double-extort-victims"
	],
	"threat_actors": [],
	"ts_created_at": 1775434456,
	"ts_updated_at": 1775791269,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/74cb3597f648ed402f5c7d072caf38ef7ab714d0.pdf",
		"text": "https://archive.orkl.eu/74cb3597f648ed402f5c7d072caf38ef7ab714d0.txt",
		"img": "https://archive.orkl.eu/74cb3597f648ed402f5c7d072caf38ef7ab714d0.jpg"
	}
}