Ransomware organization, “LockBit” claimed to have hacked the United States Federal Reserve Bank and says it is planning to expose 33 terabytes of critical data on Tuesday.
In a post on the dark web this week, the organization stated that it was in discussions with the bank to secure a ransom in exchange for keeping the data confidential.
On their website, the hackers wrote: “33 terabytes of juicy banking information containing Americans’ banking secrets.” They added: “You better hire another negotiator within 48 hours, and fire this clinical idiot who values Americans’ bank secrecy at $50,000.”
LockBit became notorious in 2019 after they collected millions of dollars in ransom payments. Even though the FBI and other law enforcement authorities took down LockBit’s internet infrastructure in February, the organization managed to resurface and continues to operate.
However, cybersecurity experts are wary of the news and point out that LockBit has not disclosed any of the sample data it claims to have stolen.
Internet news “The Daily Dot” contacted the Federal Reserve to validate LockBit’s assertions but did not get a response.
In comments on X, the malware sample hosting service “vx_undeground” voiced disbelief that the criminal gang could accomplish such a feat.
“If Lockbit ransomware group ransomed the United States Federal Reserve it would be DEFCON 2 and the administrators would need to worry about a drone strike,” the organization joked.
The statement continued: “Unless the Lockbit ransomware group ransomed something small in the Federal Reserve like maybe Lockbit took down their coffee machine and they can’t watch anime or something (we don’t know what the staff at the Federal Reserve do).”
Dominic Alvieri, a cybersecurity consultant and security researcher who writes on ransomware organizations, was also skeptical of LockBit’s claimed.
“No proof, so probably just blowing off steam,” Alvieri explained.
Other critics shared similar sentiments such as Brett Callow, a threat analyst at Emsisoft, who told the Daily Dot that he felt LockBit was only trying to get attention.
“LockBit’s claim is likely complete and utter bollo… erm, nonsense, and a tactic designed to get its ailing RaaS [Ransomware-as-a-Service) back into the limelight,” Callow said.
Given LockBit’s promise to release the data on Tuesday, if the ransom is not paid ransom, it won’t be long until all of the questions are addressed.
Just last month, the National Crime Agency of the United Kingdom exposed the name of who they believe to be LockBit’s chief.
According to the agency, Dmitry Khoroshev, a Russian national, is the chief behind the hacking site and has subsequently been sanctioned by the United States, United Kingdom, and Australia.
The United States government is promising $10 million for information that leads to Khoroshev’s arrest or conviction.