{
	"id": "fc751c86-19b5-42fb-89a2-ff00af0e6362",
	"created_at": "2026-04-06T00:07:28.114806Z",
	"updated_at": "2026-04-10T03:21:31.814401Z",
	"deleted_at": null,
	"sha1_hash": "eeec0a51a59dc3ffeaf1eaf83654df7b9a6ce19c",
	"title": "LockBit 3.0 Leaks 600 GBs of Data Stolen From Indian Lender",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 121345,
	"plain_text": "LockBit 3.0 Leaks 600 GBs of Data Stolen From Indian Lender\r\nBy Jayant Chakravarti\r\nArchived: 2026-04-05 17:45:06 UTC\r\nFraud Management \u0026 Cybercrime , Geo Focus: Asia , Geo-Specific\r\nData Leak Comes After Fullerton India Refused to Negotiate With Ransomware Group (@JayJay_Tech) • May 8,\r\n2023    \r\nThe LockBit 3.0 ransomware group on Monday leaked 600 gigabytes of critical data stolen from Indian lender\r\nFullerton India, two weeks after the group demanded a $3 million ransom from the company.\r\nSee Also: Experts Offer Insights from Theoretical to the Realities of AI-enabled Cybercrime\r\nFullerton India said on April 24 that it had suffered a malware attack that forced it to temporarily operate offline as\r\na precaution. The company said it had resumed customer services and worked with global cybersecurity experts to\r\nmake its security environment more resilient.\r\nThe ransomware group soon listed Fullerton India as a victim on its data leak site, stating it had stolen more than\r\n600 gigabytes of \"loan agreements with individuals and legal companies.\"\r\nThe group set a deadline of April 29 for the company to pay the ransom to keep the group from publishing the\r\nstolen data. The group also gave the company the option to pay $1,000 to extend the deadline by 24 hours.\r\nFullerton India operates 699 branches across India that offer doorstep credit services to around 2.1 million\r\ncustomers. The company in 2022 had more than $2.5 billion worth of assets under management and employed\r\nhttps://www.bankinfosecurity.com/lockbit-30-leaks-600-gbs-data-stolen-from-indian-lender-a-22010\r\nPage 1 of 2\n\nover 13,000 people.\r\nRitesh Bhatia, noted cybercrime researcher and the founder of V4WEB Cybersecurity, shared evidence with\r\nInformation Security Media Group about the LockBit group releasing documents related to Fullerton India on the\r\ndark web. He said the data leak occurred as a result of Fullerton India refusing to engage with the ransomware\r\ngroup, leading to the group initiating triple-extortion tactics to force the company to pay.\r\nWhile double extortion involves ransomware actors encrypting a victim's data and exfiltrating it to place\r\nadditional pressure on the victim to pay, a triple-extortion tactic involves hackers contacting the victim's clients,\r\nbusiness partners, vendors and customers to make the breach public and force the victim to come to the\r\nnegotiating table.\r\nSource: https://www.bankinfosecurity.com/lockbit-30-leaks-600-gbs-data-stolen-from-indian-lender-a-22010\r\nhttps://www.bankinfosecurity.com/lockbit-30-leaks-600-gbs-data-stolen-from-indian-lender-a-22010\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.bankinfosecurity.com/lockbit-30-leaks-600-gbs-data-stolen-from-indian-lender-a-22010"
	],
	"report_names": [
		"lockbit-30-leaks-600-gbs-data-stolen-from-indian-lender-a-22010"
	],
	"threat_actors": [],
	"ts_created_at": 1775434048,
	"ts_updated_at": 1775791291,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/eeec0a51a59dc3ffeaf1eaf83654df7b9a6ce19c.pdf",
		"text": "https://archive.orkl.eu/eeec0a51a59dc3ffeaf1eaf83654df7b9a6ce19c.txt",
		"img": "https://archive.orkl.eu/eeec0a51a59dc3ffeaf1eaf83654df7b9a6ce19c.jpg"
	}
}