{"id":7929,"date":"2023-02-01T03:57:00","date_gmt":"2023-01-31T18:57:00","guid":{"rendered":"https:\/\/cyberenso.jp\/?p=7929"},"modified":"2023-02-08T04:00:40","modified_gmt":"2023-02-07T19:00:40","slug":"lockbit-ransomware-group-announce-a-new-encryptor-based-on-the-leaked-source-code-of-conti-ransomware","status":"publish","type":"post","link":"https:\/\/cyberenso.jp\/en\/lockbit-ransomware-group-announce-a-new-encryptor-based-on-the-leaked-source-code-of-conti-ransomware\/","title":{"rendered":"LockBit ransomware group announce a new encryptor based on the leaked source code of Conti ransomware"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"7929\" class=\"elementor elementor-7929\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c05c32b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c05c32b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1c2f3c5\" data-id=\"1c2f3c5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-121c0df elementor-widget elementor-widget-text-editor\" data-id=\"121c0df\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>This week, it was revealed that the LockBit ransomware gang has released their latest encryptor named \u201cLockBit Green\u201d. After analyse by cyber security analysts and information disclosed by the ransomware group, it has been revealed that the new encryptor \u201cLockBit Green\u201d is based on the leaked source code of the former Conti ransomware.<\/p><p>Furthermore, the cybersecurity firm PRODAFT stated that they now know of at least five victims that have been attacked using the new encryptor. Apart from the similarities found between the Conti encryptor and LockBit\u2019s new encryptor, there has been a change observed which is LockBit Green uses what appears to be a random extension rather than the standard \u201c.lockbit\u201d extension.<\/p><p>PRODAFT told Tech news site, BleepingComputer that they believe that one reason for the new encryptor could be that the ex-Conti members within the LockBit group prefer LockBit Green and could possibly feel comfortable using Conti-based ransomware.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>This week, it was revealed that the LockBit ransomware gang has released their latest encryptor named \u201cLockBit Green\u201d. After analyse by cyber security analysts and information disclosed by the ransomware group, it has been revealed that the new encryptor \u201cLockBit Green\u201d is based on the leaked source code of the former Conti ransomware. Furthermore, the cybersecurity firm PRODAFT stated that<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":7934,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,12,9,2,1],"tags":[],"class_list":["post-7929","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-latest_news","category-read_article","category-ransomware_criminals","category-ce_news","category-uncategorized"],"acf":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2023\/02\/Picture1-6.jpg?fit=1375%2C917&ssl=1","_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/7929"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=7929"}],"version-history":[{"count":6,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/7929\/revisions"}],"predecessor-version":[{"id":7937,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/7929\/revisions\/7937"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/7934"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=7929"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/categories?post=7929"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/tags?post=7929"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}