LockBit Ransomware Group Reportedly Suffers Data Breach, Extortion Tactics Revealed

LockBit group’s admin and affiliate panels were reportedly defaced and replaced with a message and link to MySQL database.

Advertisement
Written by Akash Dutta, Edited by Siddharth Suvarna | Updated: 9 May 2025 18:39 IST
Highlights
  • The panels said to show the message “Don’t do crime[.]Crime is bad”
  • The MySQL database dump reportedly contains twenty tables
  • It also shows negotiation messages between LockBit and victims

As many as 75 admin and affiliate names were also listed in a “users” table

Photo Credit: Unsplash/Desola Lanre-Ologun

LockBit, the notorious ransomware group, reportedly suffered a massive data breach on Wednesday. As per the report, the group's dark web platform's admin and affiliate panels were compromised to show a message and link to a MySQL database dump. The database reportedly contains 20 tables that include sensitive information around the cybercriminal group's affiliate network, extortion tactics, details around malware builds, as well as nearly 60,000 Bitcoin addresses. Notably, this is the second time the ransomware group has been hacked, with the previous attack occurring in 2024.

LockBit Hack Reveal Insights Into The Gang's Workings

The data breach was first spotted by X (formerly known as Twitter) user Rey, who posted a screenshot of the admin panel. All of the admin and affiliate panels were reportedly taken over to display the message, “Don't do crime[.]CRIME IS BAD xoxo from Prague.” The text is followed by the MySQL link "paneldb_dump.zip."

According to a BleepingComputer report, the link leads to a MySQL file containing a massive database. The data reportedly features 20 different tables, where some tables revealed information about how the ransomware group functioned, as well as its malware builds.

Advertisement

One of the tables, labelled “btc_addresses,” reportedly features as many as 59,975 unique Bitcoin addresses. Another “builds” table is said to feature individual malware builds that were created by the group's affiliates. These are said to be different versions of the same ransomware that the group used to attack others. Some of the builds reportedly also mentioned the names of the targeted companies. This table is also said to feature public keys to the builds, but no private keys. Private keys are necessary to access the ransomware.

Advertisement

Apart from this, the database reportedly featured a “builds_configurations” that revealed information about different configurations used for each version of the malware. The most interesting information, however, was reportedly contained in the “chats” table.

The table is said to contain 4,442 negotiation messages between the LockBit ransomware operators and victims. The messages reportedly were dated between December 19, 2024 and April 29. This list highlighted different extortion techniques used by the gang.

Advertisement

Further, a “users” table reportedly revealed the names of 75 admins and affiliates of the group. These names were said to belong to individuals who had access to the panels. Additionally, the table also contained passwords used by the admins in plaintext.

In a separate post, Rey shared a conversation with a LockBit operator, who goes by the username “LockBitSupp”, confirming the data breach. The operator stated that the source code of the ransomware and private keys were not lost during the hack. The group or individual behind the LockBit hack is currently not known.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement
Popular Mobile Brands
  1. Pixel 10a Spotted in Leaked Verizon Certification With These Specifications
  2. Vivo X300, Vivo X300 Pro Go on Sale in India: Price, Offers, Features
  3. Realme 16 Pro+ 5G Chipset, Battery, Camera Details Teased Ahead of Launch
  4. Google Is Reportedly Testing AI Mode Integration Within Chrome Browser
  5. Realme 16 Pro Series Confirmed to Launch in India Soon
  6. Facebook's App Updated With Redesigned Feed, New Search Algorithm
  7. Poco X8 Pro Listed on BIS Certification Website, Could Launch in India Soon
  8. Instagram's Latest Edits Update Adds New Templates, Customisation and More
  9. OpenAI Rolls Out GPT-5.1-Powered ChatGPT Personalities in India
  10. Samsung Could Launch Three Galaxy A-Series Models Early Next Year
  1. Google Is Reportedly Testing AI Mode Integration Within Chrome Browser
  2. Instagram’s Edits App Updated With New Templates, Lock Screen Widgets and More
  3. Oppo Reno 15C Key Specifications, Launch Date Revealed via Certification Listing: Report
  4. Google Faces EU Antitrust Investigation Over AI Overviews, YouTube
  5. My Hero Academia Vigilantes Season 2 OTT Release Date: When and Where to Watch it Online?
  6. Can This Love Be Translated is Coming Soon on Netflix: What You Need to Know
  7. Theeyavar Kulai Nadunga OTT Release Date: When and Where to Watch it Online?
  8. Emily in Paris Season 5 OTT Release Date: When and Where to Watch it Online?
  9. Pixel 10a Specifications Spotted in Leaked Verizon Network Certification; Could Feature 6.3-Inch AMOLED Screen, 5,100mAh Battery
  10. Realme 16 Pro+ 5G Chipset, Battery and Camera Details Teased Ahead of Launch; Tipped to Feature Periscope Telephoto Camera
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.