In this edition of the Bitdefender Threat Debrief, we cover several key ransomware developments, including a recent LockBit exposure, Qilin’s rise, and updates on DragonForce activities.
Ransomware is a moving target, and our goal with this monthly Bitdefender Threat Debrief is to help you stay ahead of the curve. To do this, we combine information from openly available sources (OSINT) - things like news reports and research – with data we gather by analyzing Data Leak Sites (DLSs), websites where ransomware groups post details about their victims. It’s important to remember that we can't independently verify all of these claims but are confident in the trends we see over time.
For this month's report, we analyzed data from April 1 to April 30 and recorded a total of 542 claimed ransomware victims.
LockBit is a Ransomware as a Service (RaaS) group that regularly navigates challenges, and most recently, it was a case of attackers being attacked.
On May 7, 2025, reports of a breach exposing LockBit’s operations spread throughout cybersecurity forums and social media platforms. The attacker breached a LockBit 4.0 onion site and posted the following message:
"Don't do crime CRIME IS BAD xoxo from Prague."
Those behind the breach also posted a link on the page that allows visitors to access a MySQL database dump of LockBit’s data.
The threat actor that compromised LockBit exploited a flaw in the server that affects PHP 8.1.2. Once this flaw is exploited, a threat actor can perform remote code execution.
The database dump contains data that spans the last five months, from December 2024 to April 2025. The data available provides details on LockBit’s affiliate program and tools, including individual builds and build configurations for attacks against ESXi and other systems. User values for 75 affiliate members and passwords, stored in plaintext, are also included in that data dump. Nearly 60,000 Bitcoin addresses were extracted. The threat actor also extracted thousands of chats from a chats table. The LockBit builder itself and the decryptor tool were not compromised or leaked, and several additional LockBit domains remain active and unaffected.
Threat researchers and security teams can leverage the leaked data to advance threat intelligence and attribution efforts. For example, security engineers and researchers can draw connections between affiliate groups by referencing a wider dataset on tooling components and affiliate contacts.
This data breach has also spurred the creation of LockBit GPT to enhance threat analysis and intelligence tasks that are essential to understand and combat LockBit’s operations.
You may already be familiar with BlackBasta GPT. Following Black Basta’s exposure in late February, that tool was used to automate the process of collecting and analyzing leaked data to simplify and examine developments in Black Basta operations. Hudson Rock, the security and intelligence firm behind BlackBasta GPT created the new LockBit GPT as well.
Could an affiliate or rival be behind the attack? While there are multiple scenarios that may explain why an individual or entity would attack LockBit’s infrastructure, there’s one explanation that has striking implications for LockBit and similar groups. Consider the message associated with the attack and the potential impact. The same message, "Don't do crime CRIME IS BAD xoxo from Prague," was observed in the Everest defacement in March of 2025. This indicates the breach may be part of a larger effort by another ransomware group to derail the competition and acquire greater resources, including affiliates and targets.
The most recent breach adds to the list of challenges LockBit has navigated over the years. In September 2022, LockBit 3.0 builder was leaked, lifting the barrier for other groups to operate as they’d develop encryptors using the builder. Then, in 2024, law enforcement hit LockBit’s operations with a seizure of their infrastructure. Staffing concerns and greater scrutiny of the group also emerged in the wake of charges against seven key LockBit personnel, including the developer Rostislav Panev, nearly a year later.
LockBit fell from our Top 10 Ransomware Groups in October of 2024 but remained active in the six months that followed, conducting attacks that leveraged lockbit and lockbit3 ransomware. However, the number of victims LockBit claimed each month in that time span declined significantly, and at this point, they have not regained a spot in the Top 10.
Some ransomware groups operate for years and have a devastating impact across public and private sectors. Other groups may cease their operations, often as a result of law enforcement efforts, schisms within the group, or external factors like competition and limited resources.
Regardless of a ransomware group’s maturity, operational gaps, or shifting influence, it is important to understand ransomware threats and best practices that are essential to secure your organization’s assets. For a comprehensive analysis of the current ransomware playbook, including how these attacks are executed and how to defend against them, please read our updated Ransomware whitepaper.
Now, let’s explore other notable news and findings since our last Threat Debrief release.
Bitdefender's Threat Debrief analyzes data from ransomware leak sites, where groups publicize their claimed number of compromised organizations. This approach provides valuable insights into the overall activity of the RaaS market. However, there is a trade-off: while it reflects attackers' self-proclaimed success, the information comes directly from criminals and may be unreliable. Additionally, this method only captures the number of victims claimed, not the actual financial impact of these attacks.
Ransomware gangs prioritize targets where they can potentially squeeze the most money out of their victims. This often means focusing on developed countries. Here are the top 10 countries that took the biggest hit from these attacks during April 2025.
Ransomware gangs may target organizations in the critical infrastructure ecosystem, select other organizations that offer services tailored to the consumer marketplace, or attack both. Here are the Top 10 industries ransomware groups attacked during April.
The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing ransomware-related threat news, trends, and research from the previous month. Don’t miss the next BDTD update, subscribe to the Business Insights blog, and follow us on X. You can find last month's debrief here.
About Bitdefender
Bitdefender provides cybersecurity solutions and advanced threat protection to hundreds of millions of endpoints worldwide. More than 180 technology brands have licensed and added Bitdefender technology to their product or service offerings. This vast OEM ecosystem complements telemetry data already collected from our business and consumer solutions. Bitdefender Labs discovers 400+ new threats each minute and validates 30 billion threat queries daily. This gives us one of the industry’s most extensive real-time views of the evolving threat landscape.
We would like to thank Bitdefenders Vlad Craciun, Mihai Leonte, Gabriel Macovei, Andrei Mogage, and Rares Radu for their help with this report.
tags
Jade Brown is a threat researcher at Bitdefender. A cybersecurity thought leader who is passionate about contributing to operations that involve cybersecurity strategy and threat research, she also has extensive experience in intelligence analysis and investigation.
View all postsDon’t miss out on exclusive content and exciting announcements!