{"id":1243,"date":"2023-04-24T00:00:00","date_gmt":"2023-04-24T00:00:00","guid":{"rendered":"https:\/\/www.nextias.com\/current_affairs\/uncategorized\/24-04-2023\/lockbit-ransomware\/"},"modified":"2023-04-24T00:00:00","modified_gmt":"2023-04-24T00:00:00","slug":"lockbit-ransomware","status":"publish","type":"post","link":"https:\/\/www.nextias.com\/ca\/current-affairs\/24-04-2023\/lockbit-ransomware","title":{"rendered":"LockBit Ransomware"},"content":{"rendered":"<p><span style=\"font-size:12pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong><u>In News<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">Cybercriminals have developed new ransomware encryptors designed to target<\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong> macOS devices, <\/strong><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">making this the <\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>first major ransomware operation<\/strong><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"> to specifically target Apple computers.<\/span><\/span><\/span><\/li>\n<\/ul>\n<p><span style=\"font-size:12pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong><u>What is LockBit ransomware?<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Ransomware<\/strong><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"> is a form of <\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>malware designed to encrypt files on a device<\/strong><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">Lockbit ransomware was named <\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>\u201cabcd\u201d virus <\/strong><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">and was first reported in 2019, the virus is categorised as a <\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>\u201ccrypto virus\u201d<\/strong><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"> due to its requests for<\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong> payment in cryptocurrency to<\/strong><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"> decrypt the files on the victim\u2019s device.<\/span><\/span><\/span><\/li>\n<\/ul>\n<p><span style=\"font-size:12pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong><u>How does it work?<\/u><\/strong><\/span><\/span><\/span><\/p>\n<p style=\"text-align:center\">\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In News Cybercriminals have developed new ransomware encryptors designed to target macOS devices, making this the first major ransomware operation to specifically target Apple computers. What is LockBit ransomware? Ransomware is a form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1244,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[21],"tags":[26,42],"class_list":["post-1243","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-current-affairs","tag-gs-3","tag-literature"],"acf":[],"jetpack_featured_media_url":"https:\/\/wp-images.nextias.com\/cdn-cgi\/image\/format=auto\/ca\/uploads\/2023\/07\/6440941Screenshot_6.png","_links":{"self":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/1243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/comments?post=1243"}],"version-history":[{"count":0,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/1243\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/media\/1244"}],"wp:attachment":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/media?parent=1243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/categories?post=1243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/tags?post=1243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}