FBI Recovers 7,000 Decryption Keys Through Operation Cronos

By Daniel Lopez

The Federal Bureau of Investigation (FBI) advises LockBit ransomware attack victims to contact the Internet Crime Complaint Center (IC3). The FBI has secured over 7,000 decryption keys that past victims can use to retrieve their data files at no cost.

During the 2024 Boston Conference on Cyber Security, it was confirmed by FBI Cyber Assistant Director Bryan Vorndran that the FBI has a substantial number of decryption keys in its possession due to its continuing initiatives to break up the LockBit ransomware activities. The FBI was busy with a worldwide law enforcement campaign called Operation Cronos. The UK National Crime Agency leads Operation Cronos, which seized 34 servers and retrieved over 2,500 decryption keys. The FBI had created a free decryptor to help victims recover their files at no cost. With its ongoing operations, more decryption keys will be obtained.

The FBI has additionally confirmed that a Russian coder called Dimitri Khoroshev, otherwise known as LockBitsupp, set up the LockBit ransomware-as-a-service (RaaS) operation. Dimitri Khoroshev is now indicted and sanctioned together with six co-conspirators. They are charged with extortion, fraud, and other crimes. However, Khoroshev is unlikely to face justice since he is in Russia where no extradition treaty is enforced, and Khoroshev will probably not leave the country.

Khoroshev operated the ransomware-as-a-service operation and partnered with many affiliates and criminal groups to perform attacks. LockBit keeps 20% of the ransom payments from the affiliate’s operations while the affiliates retain 80%. Besides handling the operation, Khoroshev assists affiliates set optimal ransom demands, launders cryptocurrency, and offers the system to manage the attacks, which includes storage and hosting of the stolen information.

LockBit has been a high-profile ransomware group that also targets organizations covered by HIPAA laws since 2022. The group is believed to have gotten over $1 billion in ransom income and has done over 7,000 attacks from June 2022 to February 2024. The FBI also confirmed that the group keeps the stolen data even after the victims have paid. The group only removes the data from its leak site after payment. Operation Cronos seemed to be successful although the shutdown of LockBit operations was temporary. Khoroshev rebuilt its infrastructure and kept the group active.

According to Vorndran, Khoroshev turned against his rivals and gave the FBI the names of other ransomware group operators so that the FBI would stop going after him. Nevertheless, Vorndran said that the FBI would not go easy on him.

Twitter Facebook LinkedIn Reddit Link copied to clipboard

Posted by

Daniel Lopez

Daniel Lopez is the HIPAA trainer behind HIPAA Coach and the HIPAA subject matter expert for NetSec.news. Daniel has over 10 years experience as a HIPAA coach. Daniel provides his HIPAA expertise on several publications including Healthcare IT Journal and The HIPAA Guide. Daniel has studied Health Information Management before focusing his career on HIPAA compliance and protecting patient privacy. You can follow Daniel on Twitter / X https://twitter.com/DanielLHIPAA