60K Bitcoin addresses leaked as LockBit ransomware gang gets hacked
By: cryptosheadlines|2025/05/08 16:15:04
0
Share
Airdrop Is Live CaryptosHeadlines Media Has Launched Its Native Token CHT. Airdrop Is Live For Everyone, Claim Instant 5000 CHT Tokens Worth Of $50 USDT. Join the Airdrop at the official website, CryptosHeadlinesToken.com Almost 60,000 Bitcoin addresses tied to LockBit’s ransomware infrastructure were leaked after hackers breached the group’s dark web affiliate panel. The leak included a MySQL database dump shared publicly online. It contained crypto-related information that could help blockchain analysts trace the group’s illicit financial flows. Ransomware is a type of malware used by malicious actors. It locks its target’s files or computer systems, making them inaccessible. The attackers typically demand a ransom payment, often in digital assets like Bitcoin (BTC), in exchange for a decryption key to unlock the files.LockBit is one of the most notorious crypto ransomware groups. In February 2024, 10 countries launched a joint operation to disrupt the group, saying that the organization had caused billions in damages to key infrastructure. Source: ReyXBFNo Bitcoin private keys leakedWhile almost 60,000 Bitcoin wallets were leaked, no private keys were included. One X user shared a conversation with a LockBit operator, confirming the breach. However, the LockBit person said no private keys or data were lost. Despite this, analysts at Bleeping Computer said the database contained 20 tables, including a “builds” table. This included individual ransomware builds created by the organization’s affiliates. The data also identified some of the target companies for the builds. In addition, the leaked database also included a “chats” table. This table contained over 4,400 negotiation messages between victims and the ransomware organization. Related: Crypto crime in 2024 likely exceeded $51B, far higher than reported: ChainalysisLockBit hack tied to Everest ransomware breachIt’s unclear who was behind the breach and how they got into LockBit’s operations, but Bleeping Computer analysts said the message used in the Everest ransomware site breach matched the one used in LockBit. The analysts suggested that there may be a link between the two incidents. The breach highlighted the role that crypto plays in the ransomware economy. Each victim is usually assigned an address to pay their ransom, allowing the affiliates to monitor payments while attempting to obscure ties to their main wallets. The exposure of the addresses allows law enforcement and blockchain investigators to track patterns and potentially link past ransom payments to known wallets. Magazine: Adam Back says Bitcoin price cycle ’10x bigger’ but will still decisively break above $100KSource link
You may also like

Quick Overview of Alliance ALL16 Demo Day: 18 New Projects Featuring Emerging Trends in Prediction Markets and AI Applications
ALL17 application deadline is March 25.

The Ethereum Foundation launches "Hardness," a dedicated team to safeguard the decentralized baseline
Hardness is a protocol-level commitment to the core attributes of Ethereum, including censorship resistance, privacy, security, and permissionlessness.

Morning News | Boya Interactive plans to invest no more than $70 million to purchase cryptocurrency; WeChat launches official lobster plugin; Bitcoin mining difficulty decreased by 7.76% to 133.79 T
Overview of Important Market Events on March 22

The competition for stablecoin yields, how has it stalled U.S. cryptocurrency regulatory legislation?
Congress has only a few weeks left to seek bank support for the CLARITY Act, or it may shelve the legislation due to the midterm elections.

This Week's News Preview | The joint cryptocurrency regulatory guidance document from the U.S. SEC and CFTC officially takes effect; Polymarket announces major news
Highlights of the week from March 23 to March 29.

What characteristics do the projects delisted by mainstream exchanges have?
Mainstream exchanges are, on one hand, massively delisting coins, and on the other hand, massively listing tokenized stock assets. Essentially, this is a supply-side reform aimed at "bad money." The quality of the asset targets and the compliance of the platforms will become the focus of competition...

Before the $75,000 Gamma level, both bulls and bears are waiting for a signal
The selling pressure is being digested, and the belief is still on the way.

Business Opportunities of Tokenized Stocks
In this article, we will outline the lifecycle of tokenized stocks, analyze the current market landscape, and highlight the emerging business opportunities.

In-depth research report on the Resolv protocol hacking incident, who is the final payer?
This incident reveals a fundamental weakness in Delta's stablecoin - the coupling point between the minting logic and off-chain signatures/oracles is the most vulnerable attack surface of the system. Any capital efficiency design of "1 dollar minted for 1 dollar" must be predicated on extremely rigo...

Crypto Market Sees Large Liquidations: $272 Million in Long Positions Affected
Key Takeaways In the last 24 hours, $272 million worth of contracts were liquidated across the entire crypto…

Whale Increases BTC Shorts and Bets on Crude Oil: A Strategic Crypto Move
Key Takeaways A prominent whale, known as “UnRektCapital,” has strategically escalated its short position in Bitcoin while simultaneously…

Hackers in Brazil Use Fake Google Play Store to Steal Cryptocurrency
Key Takeaways Hackers in Brazil are exploiting fake Google Play Store pages to spread Android malware. Infected devices…

Exchanging 200,000 for nearly 100 million, DeFi stablecoins face another attack
DeFi project teams cannot assume that the modules they control are necessarily secure.

The underlying business agreement of the trillion-dollar Agent economy: Understanding ERC-8183, it's not just about payments, but the future
This article systematically analyzes the technical principles and commercial value of the ERC-8183 protocol from the dimensions of technical architecture, core mechanisms, application scenarios, and ecological collaboration.

When Wall Street's ETH begins to "yield": Looking at the asset properties of Ethereum from BlackRock's ETHB
ETH is undergoing a paradigm shift from a "volatile asset" to a "yield-generating cash flow asset."

The Power of Agency: The Agentic Wallet and the Next Decade of Wallets
In 1984, Apple killed the command line with a mouse. In 2026, Agent is killing the mouse.

Understanding x402 and MPP in One Article: Two Routes for Agent Payments
x402 makes payments within the agreement, while MPP makes system-level payments.

Particle Founder: The entrepreneurial insights I have gained the most from in the past year
Stop lean startup, stop lightning entrepreneurship, and think carefully about what your product aspirations are.
Quick Overview of Alliance ALL16 Demo Day: 18 New Projects Featuring Emerging Trends in Prediction Markets and AI Applications
ALL17 application deadline is March 25.
The Ethereum Foundation launches "Hardness," a dedicated team to safeguard the decentralized baseline
Hardness is a protocol-level commitment to the core attributes of Ethereum, including censorship resistance, privacy, security, and permissionlessness.
Morning News | Boya Interactive plans to invest no more than $70 million to purchase cryptocurrency; WeChat launches official lobster plugin; Bitcoin mining difficulty decreased by 7.76% to 133.79 T
Overview of Important Market Events on March 22
The competition for stablecoin yields, how has it stalled U.S. cryptocurrency regulatory legislation?
Congress has only a few weeks left to seek bank support for the CLARITY Act, or it may shelve the legislation due to the midterm elections.
This Week's News Preview | The joint cryptocurrency regulatory guidance document from the U.S. SEC and CFTC officially takes effect; Polymarket announces major news
Highlights of the week from March 23 to March 29.
What characteristics do the projects delisted by mainstream exchanges have?
Mainstream exchanges are, on one hand, massively delisting coins, and on the other hand, massively listing tokenized stock assets. Essentially, this is a supply-side reform aimed at "bad money." The quality of the asset targets and the compliance of the platforms will become the focus of competition...