LockBit Ransomware Gang Affiliates Breached, Victim Negotiations Exposed

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity & Streaming Writer

The LockBit ransomware gang, notorious for its prolific cyberattacks, suffered a breach of its affiliate forums and databases, which exposed critical operational details. The attack targeted LockBit’s dark web affiliate panels.

Attackers defaced the site with a message reading, “Don’t do crime CRIME IS BAD xoxo from Prague,” alongside a link to a MySQL database dump file. The same message was seen on the defaced leak site of the Everest Ransomware gang in April 2025.

LockBit defacement message
LockBit defacement message | Source: Rey on X

The leaked data reveals various internal operations, including:

Affiliate panel 'chats' table
Affiliate panel 'chats' table | Source: BleepingComputer

Known for its global footprint of operations, Everest ransomware is a Russia-linked threat actor responsible for numerous data breaches targeting enterprises and government organizations. 

The LockBit server was running PHP version 8.1.2, which is exposed to the critical vulnerability CVE-2024-4577. This exploit allows remote code execution, making it a likely vector used by the attackers.

The LockBit operator, known as "LockBitSupp," confirmed that affiliate panels were indeed hacked but claimed that no private keys or critical operational data were leaked. Despite these assurances, the timing of the database dump and its public exposure undermine the gang’s reputation and operational secrecy.

This development added another layer to the challenges already faced by the group following law enforcement actions in recent years.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: