Skip to content
Quick exit
  • Cymraeg
  • Reporting SARs
  • CSEA Reporting for Industry
NCA Logo
Protecting the public from serious and organised crime
  • Who we are
    • Our mission
    • Our people
    • Our leadership
    • Governance and transparency
    • Inclusion, diversity and equality
    • Publications
  • What we do
    • What we investigate
    • Border vulnerabilities
    • Bribery, corruption and sanctions evasion
    • Cybercrime
    • Child sexual abuse and exploitation
    • Drug trafficking
    • Illegal firearms
    • Fraud
    • Kidnap and extortion
    • Missing persons
    • Modern slavery and human trafficking
    • Money laundering and illicit finance
    • Organised immigration crime
    • Operation Stovewood: Rotherham child sexual abuse investigation
    • How we work
    • Intelligence: enhancing the picture of serious organised crime affecting the UK
    • Investigating and disrupting the highest risk serious and organised criminals
    • Providing specialist capabilities for law enforcement
    • Supporting victims and survivors
    • National Strategic Assessment for Serious and Organised Crime
    • Underworld: Behind the scenes of the NCA Podcast
  • News
    • All news
  • Careers
    • How to join the NCA
    • Applying and onboarding
    • Current vacancies
    • A day in the life
    • Benefits and support
  • Most Wanted
  • Contact us
    • Officer verification
    • Return of seized property
    • Provide information on serious and organised crime
    • Whistleblowing
    • Complaints
    • Media enquiries
  1. Home >
  2. The NCA announces the disruption of LockBit with Operation Cronos

Share this page:

Share this page:

The NCA announces the disruption of LockBit with Operation Cronos

Expired
Operation Cronos

 

The NCA has revealed details of an international disruption campaign targeting the world’s most harmful cyber-crime group, LockBit.

Read our press release here.

What is LockBit?

LockBit was considered the largest ransomware group in terms of impact globally, responsible for 25% of ransomware attacks in the last year (2023-2024).

LockBit were in operation for four years and during that time, attacks utilising their ransomware were prolific. LockBit ransomware attacks targeted thousands of victims around the world, including in the UK, and caused losses of billions; both in ransom payments and in the costs of recovery.

The group provided ransomware-as-a-service (RaaS) to a global network of hackers or ‘affiliates’, supplying them with the tools and infrastructure required to carry out attacks.

When a victim’s network was infected by LockBit’s malicious software, their data was stolen and their systems encrypted. A ransom would be demanded in cryptocurrency for the victim to decrypt their files and prevent their data from being published.

What we did

LockBit’s criminal enterprise was compromised in three strikes by: infiltrating their systems and obtaining their data, taking control, and locking them out.

Screenshot 1

LockBit's leak site

Screenshot 2:

Three strikes

Screenshot 3:

LockBit Backend Leaks

The NCA seized control of LockBit’s primary administration environment, which enabled affiliates to build and carry out attacks, and the group’s public-facing leak site on the dark web, on which they previously hosted, and threatened to publish data stolen from victims.

After infiltrating LockBit’s systems, information about their criminal activity and those who worked with them was also gathered. This included their network of 194 ‘affiliates’.

The Agency also obtained LockBit platform’s source code and a vast amount of intelligence from their systems about their activities and those who have worked with them and used their services to harm organisations throughout the world.

List of LockBit affiliates

What we’re doing now

After seizing control, the leak site was redesigned by the NCA to instead host a series of articles exposing LockBit’s capability and operations.

Content was posted daily on a range of topics showing the extent of our access and included help for their victims as well.

At the end of the week, the leak site was then taken down completely.

Reporting

Public engagement is key to this response so it is vital that organisations report it, if they are the victim of a ransomware attack. The earlier the report, the faster the NCA and partners are able to assess new methodologies and limit the damage they can do to others.

If you are in the UK, you should use the Government’s Cyber Incident Signposting Site [link] as soon as possible for direction on which agencies to report your incident to.

If you’ve been impacted by LockBit, we now have 1,000 decryption keys taken from LockBit’s site to help you decrypt stolen data:

If you’re based in the UK, please email the NCA at – lockbit@nca.gov.uk
If you’re based in the US, please visit – https://lockbitvictims.ic3.gov/
If you’re based anywhere in the world other than the UK/US, please visit – https://www.nomoreransom.org/en/decryption-tools.html

Please provide the following information to support your case:

  • Your company/organisation name and the domain attacked
  • The decryption or description ID LockBit provided you with on the ransom note
  • The date of the attack
  • Whether you reported the case to law enforcement. If so, please provide the reference
  • A contact name, email and telephone number

 

Share this page:

TOP ˄
Verify an officer using our online reporting tool.
Click CEOP logo: Advice, Help, Report
  • Who we are

  • Our mission
  • What we do

  • How we investigate
  • How we work
  • News

  • Most wanted

  • Careers

  • A day in the life
  • Current vacancies
  • Contact us

  • Missing persons
  • Operation Stovewood
  • Suspicious activity reports
  • Verify an NCA officer
  • Complaints

Follow us

  • Sitemap
  • Privacy and Cookie Policy
  • Terms and Conditions
  • Publications
  • Accessibility statement
© Crown Copyright
© Crown Copyright