Law Enforcement Cracks Down on LockBit Hackers With Major Arrests and Infrastructure Seizures To Unravel Global Ransomware Network
The cybercrime world faced another major blow this week as international law enforcement agencies took down key members of the notorious LockBit ransomware group. Announcements from Europol, the US, and UK authorities highlighted a coordinated effort to dismantle the infrastructure behind one of the most prolific ransomware operations in the world.
LockBit Hackers Arrested, Servers Seized
On Tuesday, authorities used the seized websites of the LockBit ransomware group to break the news. Europol and other agencies revealed multiple arrests, including the capture of a suspected LockBit developer while he was on vacation. The developer, requested by France, was caught outside Russia, marking a major success in targeting key figures of the operation. Simultaneously, two individuals were detained in the UK for aiding a LockBit affiliate.
Further south in Spain, police took down a critical player: the administrator of a bulletproof hosting service supporting LockBit’s infrastructure. This operation led to the seizure of nine servers, a massive step forward in dismantling the group’s cybercrime network. Authorities believe the captured data will be vital in prosecuting core members and affiliates of LockBit.
Unmasking the Evil Corp Connection
One of the most significant developments is the unmasking of Aleksandr Viktorovich Ryzhenkov, a Russian national identified as a key LockBit affiliate and a member of the infamous Evil Corp—a cybercrime organization notorious for both profit-driven ransomware attacks and alleged ties to Russian cyber-espionage operations. According to authorities, Ryzhenkov, using the alias “Beverley,” was responsible for creating over 60 LockBit ransomware variants and demanding at least $100 million in ransom.
Interestingly, Ryzhenkov has not been charged for LockBit-related crimes but for attacks using BitPaymer ransomware. His involvement in both Evil Corp and LockBit highlights the interconnected nature of many high-level cybercrime syndicates.
Operation Cronos: The Beginning of the End for LockBit?
The February 2024 takedown of LockBit infrastructure, part of Operation Cronos, marked a pivotal moment in the global fight against ransomware. The operation involved coordinated server seizures and the arrest of several affiliates. At the time, the UK’s National Crime Agency (NCA) even took over LockBit’s Tor domains, repurposing them to announce these law enforcement victories.
Authorities later identified and charged Dimitry Yuryevich Khoroshev, the mastermind behind LockBit, known online as “LockBitSupp.” Khoroshev is believed to have created and operated LockBit while reaping over $100 million in illicit gains. With a $10 million bounty on his head, he remains one of the most wanted cybercriminals in the world.
A Tarnished Legacy
While LockBit has been severely weakened by recent operations, it seems the group hasn’t completely disappeared. In May, LockBit briefly resurfaced as one of the most active ransomware operations, but some experts speculated that this was a smokescreen designed to mask the true state of the criminal enterprise. By the end of summer, attacks from LockBit had significantly declined, with its latest claim being a hack on the US Federal Reserve, although the leaked data belonged to a much smaller financial services company.
Security researchers noted that by late September, LockBit’s leak websites were offline. Although some reappeared later, they have not been updated since May, signaling the possibility of an internal collapse. A post from the NCA on one of these websites emphasized that Operation Cronos had severely damaged LockBit, with many affiliates abandoning the group for other Ransomware-as-a-Service (RaaS) platforms.
In a statement, the NCA pointed out that LockBit’s recent victim claims were largely exaggerated or outright fabricated, further tarnishing the group’s already faltering reputation.
What’s Next for Global Cybersecurity?
The takedown of LockBit marks a victory in the ongoing war against ransomware, but the fight is far from over. Cybercrime syndicates continue to adapt, and as law enforcement closes in, these organizations will likely splinter and evolve, potentially making them harder to track.
As ransomware groups like LockBit fall, the cybersecurity community must remain vigilant, anticipating the next wave of digital threats. With the global crackdown intensifying, the future of large-scale ransomware may be uncertain, but one thing is clear: law enforcement is ready and willing to disrupt these criminal enterprises, one arrest at a time.








