Federal Reserve is threatened by Ransomware group

Akilnath Bodipudi
2 min readJun 25, 2024

--

The ransomware group LockBit has claimed responsibility for hacking the Federal Reserve Bank and threatens to release 33 terabytes of sensitive data on Tuesday. In a dark web post, the group stated they had been negotiating with the bank for a ransom to keep the data private.

“33 terabytes of juicy banking information containing Americans’ banking secrets,” the group announced. “You better hire another negotiator within 48 hours, and fire this clinical idiot who values Americans’ bank secrecy at $50,000.”

LockBit gained notoriety in 2019 by collecting millions in ransom payments. Although their online infrastructure was shut down by the FBI and other law enforcement agencies in February, they have managed to reemerge.

Cybersecurity experts are skeptical of the Federal Reserve hack claims, noting that LockBit has not released any sample data.

The Daily Dot contacted the Federal Reserve for confirmation but received no response.

The malware sample hosting service vx_underground expressed doubts on X, suggesting that if LockBit had indeed hacked the Federal Reserve, it would be a major incident prompting severe repercussions. They speculated that the claims might be exaggerated to regain attention for their Ransomware-as-a-Service (RaaS).

LockBit’s claim is considered dubious and potentially a publicity tactic. The truth will be revealed soon, as the group promised to release the data on Tuesday if the ransom is not paid.

Recently, the U.K.’s National Crime Agency identified Dmitry Khoroshev, a Russian national, as LockBit’s leader. He has been sanctioned by the U.S., U.K., and Australia. The U.S. government is offering a $10 million reward for information leading to his arrest or conviction.

--

--

Akilnath Bodipudi
Akilnath Bodipudi

Written by Akilnath Bodipudi

CyberPunk who always wanted to explore a new horizons over cyber space. Doing pen testing into my own network systems for detecting the vunerabilities .

No responses yet