{"id":7526,"date":"2022-09-28T16:38:03","date_gmt":"2022-09-28T07:38:03","guid":{"rendered":"https:\/\/cyberenso.jp\/?p=7526"},"modified":"2022-11-21T16:42:28","modified_gmt":"2022-11-21T07:42:28","slug":"bl00dy-ransomware-gang-seen-using-leaked-lockbit-3-0-builder","status":"publish","type":"post","link":"https:\/\/cyberenso.jp\/en\/bl00dy-ransomware-gang-seen-using-leaked-lockbit-3-0-builder\/","title":{"rendered":"Bl00Dy Ransomware Gang seen using Leaked LockBit 3.0 builder"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"7526\" class=\"elementor elementor-7526\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-263e4e6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"263e4e6\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-eb83e8f\" data-id=\"eb83e8f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-039e795 elementor-widget elementor-widget-text-editor\" data-id=\"039e795\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Recently, the Bl00Dy Ransomware Gang has been observed using a recently leaked LockBit ransomware builder in attacks against companies. The Bl00Dy Ransomware Gang was first observed operating around May 2022, when they were targeting a group of medical and dental practices in New York.<\/p><p>Last week, the LockBit 3.0 ransomware builder was leaked on Twitter after a fallout between a LockBit operator and a LockBit developer. This leaked builder allows anyone to build a fully functional encryptor and decryptor that threat actors can use for attacks. And the Bl00Dy Ransomware Gang now adopted the builder in an attack on a Ukrainian victim. This has been confirmed by multiple cyber security researchers who have seen multiple overlaps in the code between the Bl00dy and LockBit 3.0 encryptors.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Recently, the Bl00Dy Ransomware Gang has been observed using a recently leaked LockBit ransomware builder in attacks against companies. The Bl00Dy Ransomware Gang was first observed operating around May 2022, when they were targeting a group of medical and dental practices in New York. Last week, the LockBit 3.0 ransomware builder was leaked on Twitter after a fallout between a<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":7531,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[224,6,12,2,1],"tags":[],"class_list":["post-7526","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-healthcare","category-latest_news","category-read_article","category-ce_news","category-uncategorized"],"acf":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2022\/11\/Picture1-4.jpg?fit=1373%2C773&ssl=1","_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/7526"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=7526"}],"version-history":[{"count":6,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/7526\/revisions"}],"predecessor-version":[{"id":7535,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/7526\/revisions\/7535"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/7531"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=7526"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/categories?post=7526"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/tags?post=7526"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}