FBI arrests Nigerian ‘tech queen’ Sapphire Egemasi in $1.3M heist targeting U.S. government
06/05/2025 - Updated On 06/17/2025
The notorious LockBit ransomware gang was treated to a taste of its own medicine as hackers breached its dark web affiliate panel and leaked nearly 60,000 Bitcoin addresses tied to its operations. The attackers left a mocking note: “Don’t do crime CRIME IS BAD xoxo from Prague.”
The breach exposed a MySQL database dump containing critical financial data, potentially allowing blockchain analysts to trace illicit transactions linked to the LockBit ransomware gang. While no private keys were leaked, the data could still prove devastating for the group’s operations.
The leaked database contained 20 tables, including:
A “builds” table listing ransomware variants created by affiliates.
A “chats” table with over 4,400 negotiation messages between the LockBit ransomware gang and its victims.
Bitcoin addresses used for ransom payments, enabling law enforcement to track financial flows.
Security researchers at Bleeping Computer confirmed the breach, noting that the attackers may be linked to a previous hack of the Everest ransomware group due to similarities in their messages.
The LockBit ransomware gang has long been a dominant force in cybercrime, extorting billions from businesses and critical infrastructure. In February 2024, a global law enforcement crackdown disrupted its operations, but the group quickly rebounded.
This latest hack, however, could have lasting consequences:
Exposed negotiation tactics – The leaked chats reveal how the LockBit ransomware gang pressures victims, which could help future targets resist extortion.
Bitcoin transaction tracking – Analysts can now map ransom payments to known wallets, potentially uncovering hidden funds.
Reputation damage – Being hacked undermines the LockBit ransomware gang’s credibility among cybercriminals.
Ransomware groups like the LockBit ransomware gang rely heavily on cryptocurrencies for anonymity. Each victim receives a unique Bitcoin address, allowing affiliates to monitor payments while obscuring their main wallets.
With 60,000 addresses exposed, investigators can:
Identify payment patterns – Correlating transactions could reveal money laundering routes.
Freeze stolen funds – Exchanges may blacklist linked wallets, cutting off cash flow.
Build legal cases – Authorities can use the data to prosecute affiliates.
The identity of the hackers remains unknown, but theories suggest:
A rival cybercrime group – Competing gangs often sabotage each other.
Law enforcement infiltration – Agencies may have orchestrated the leak to weaken the LockBit ransomware gang.
Disgruntled insider – Former associates could have turned against the group.
Given the mocking tone of the message, vigilante hackers seem the most likely culprits.
Despite the breach, the LockBit ransomware gang remains operational. However, the exposure of its infrastructure forces the group to:
Abandon compromised wallets – Shifting to new addresses increases operational costs.
Rebuild trust with affiliates – Hackers may now see the gang as vulnerable.
Face heightened scrutiny – Law enforcement will intensify tracking efforts.
While the LockBit ransomware gang reels from this setback, ransomware threats persist. Companies should:
Back up data regularly – Reducing reliance on decryption keys.
Train employees on phishing – Many attacks start with deceptive emails.
Monitor blockchain transactions – Early detection of ransom payments can aid recovery.
The hacking of the LockBit ransomware gang marks a rare instance of cybercriminals facing their own medicine. While the group may survive, the leaked data provides invaluable intelligence for disrupting future attacks. For now, the cybersecurity world celebrates a small but significant victory.
Will the LockBit ransomware gang recover, or is this the beginning of its downfall? Only time will tell. Stay glued to The Bit Gazette for updates on this and other crypto market developments
Jeremiah Musa lives and breathes storytelling. For over 12 years, he's chased breaking news, crafted hard-hitting features, and built content strategies that cut through the noise. These days, you'll find him leading the charge at The Bit Gazette, where he oversees a team of writers digging into the biggest stories in crypto. Based in Dubai's fast-moving fintech scene, Jeremiah has a knack for translating complex blockchain concepts into sharp, engaging content. He's just as comfortable breaking down a Bitcoin whitepaper as he is explaining market moves to newcomers. Before diving into crypto, he cut his teeth in traditional financial journalism, covering everything from emerging markets to regulatory shakeups. What keeps him up at night? Finding the human angle in every tech story. When he's not editing copy or prepping PR campaigns, he's probably arguing about the future of Web3 over karak chai or hunting down Dubai's best shawarma.