{
	"id": "6571934c-b758-4062-a30e-862936f972c6",
	"created_at": "2026-04-06T00:11:20.808383Z",
	"updated_at": "2026-04-10T03:20:35.44356Z",
	"deleted_at": null,
	"sha1_hash": "7c88fc2417fc92cf1a6da65fb80bd1860bbfa2e9",
	"title": "LockBit ransomware leaks gigabytes of Boeing data",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 3576556,
	"plain_text": "LockBit ransomware leaks gigabytes of Boeing data\r\nBy Ionut Ilascu\r\nPublished: 2023-11-12 · Archived: 2026-04-05 13:11:26 UTC\r\nThe LockBit ransomware gang published data stolen from Boeing, one of the largest aerospace companies that services\r\ncommercial airplanes and defense systems.\r\nBefore the leak, LockBit hackers said that Boeing ignored warnings that data would become publicly available and\r\nthreatened to publish a sample of about 4GB of the most recent files.\r\nBackup data published\r\nLockBit ransomware has leaked more than 43GB of files from Boeing after the company refused to pay a ransom.\r\nhttps://www.bleepingcomputer.com/news/security/lockbit-ransomware-leaks-gigabytes-of-boeing-data/\r\nPage 1 of 4\n\n0:00\r\nhttps://www.bleepingcomputer.com/news/security/lockbit-ransomware-leaks-gigabytes-of-boeing-data/\r\nPage 2 of 4\n\nVisit Advertiser websiteGO TO PAGE\r\nMost of the data listed on the hacker group’s leak site are backups for various systems, the most recent of them with an\r\nOctober 22 timestamp.\r\nThe ransomware actor posted Boeing on their site on October 27 and gave the company a November 2nd deadline to contact\r\nthem and engage in negotiations.\r\nThe hackers said at the time they had stolen “a tremendous amount of sensitive data” and were ready to publish it.\r\nBoeing page on LockBit data leak site\r\nsource: BleepingComputer\r\nBoeing disappeared from LockBit’s list of victims for a period but was listed again on November 7, when the hackers\r\nannounced that their warnings had been ignored.\r\nWhen the company continued to be silent, the LockBit ransomware gang decided to show that they had a bargaining chip\r\nand threatened to publish “just around 4GB of sample data (most recent).”\r\nThe hackers also threatened that they would publish the databases “if we do not see a positive cooperation from Boeing.”\r\nLockBit ransomware threatens Boeing with leaking stolen files\r\nsource: FalconFeed\r\nOn November 10, LockBit released on their site all the data they had from Boeing. Among the files are configuration\r\nbackups for IT management software, and logs for monitoring and auditing tools.\r\nBackups from Citrix appliances are also listed, which sparked speculation about LockBit ransomware using the recently\r\ndisclosed Citrix Bleed vulnerability (CVE-2023-4966), for which proof-of-concept exploit code was published on October\r\n24.\r\nWhile Boeing confirmed the cyberattack, the company did not provide any details about the incident or how the hackers\r\nbreached its network.\r\nhttps://www.bleepingcomputer.com/news/security/lockbit-ransomware-leaks-gigabytes-of-boeing-data/\r\nPage 3 of 4\n\nLockBit is one of the most resilient ransomware-as-a-service (RaaS) operations, having been active for more than four years\r\nand making thousands of victims across various sectors.\r\nAmong the victims are Continental automotive giant, the UK Royal Mail, the Italian Internal Revenue Service, and the City\r\nof Oakland.\r\nThe U.S. government said in June that the gang extorted about $91 million since 2020 in close to 1,700 attacks against\r\nvarious organizations in the country.\r\nHowever, the gang operates internationally. In August, the Spanish National Police warned of a phishing campaign that\r\ntargeted architecture firms in the country to encrypt systems with LockBit’s locker malware.\r\nAutomated Pentesting Covers Only 1 of 6 Surfaces.\r\nAutomated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the\r\nother.\r\nThis whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic\r\nquestions for any tool evaluation.\r\nSource: https://www.bleepingcomputer.com/news/security/lockbit-ransomware-leaks-gigabytes-of-boeing-data/\r\nhttps://www.bleepingcomputer.com/news/security/lockbit-ransomware-leaks-gigabytes-of-boeing-data/\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.bleepingcomputer.com/news/security/lockbit-ransomware-leaks-gigabytes-of-boeing-data/"
	],
	"report_names": [
		"lockbit-ransomware-leaks-gigabytes-of-boeing-data"
	],
	"threat_actors": [],
	"ts_created_at": 1775434280,
	"ts_updated_at": 1775791235,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/7c88fc2417fc92cf1a6da65fb80bd1860bbfa2e9.pdf",
		"text": "https://archive.orkl.eu/7c88fc2417fc92cf1a6da65fb80bd1860bbfa2e9.txt",
		"img": "https://archive.orkl.eu/7c88fc2417fc92cf1a6da65fb80bd1860bbfa2e9.jpg"
	}
}