LockBit’s $10M Bounty Gamble: 60K Bitcoin Addresses Leaked in Embarrassing Security Meltdown
Ransomware giant LockBit scrambles to save face after hacker exposes 60,000 BTC addresses—now offering a bounty that smells suspiciously like desperation.
The ’professional’ criminals just got out-crimed: Someone breached their doxxing database, revealing wallet addresses tied to illicit payments. Cue the frantic damage control.
Finance world shrugs: ’Another day, another crypto crime syndicate learning the hard way that immutable ledgers work both ways.’
LockBit offers bounty
LockBit has reportedly clarified that only a lightweight management panel had been breached. It emphasized that Core tools like the locker builder, decryptors, and source code remained secure.
Despite this claim, the breach marks a significant blow to its criminal credibility among affiliates and clients.
In a surprising twist, LockBit offered a bounty for information on the hacker. The group claims the attacker may be someone called “xoxo” based in Prague.
The platform stated:
“If you can provide accurate and reliable information about this person’s identity — I’m willing to pay for it.”
This bounty offer comes with a hint of irony, as LockBit is a target of a US government bounty program.
The US authorities accuse the group of executing over 2,500 ransomware attacks in more than 120 countries. Nearly 1,800 of those victims were reportedly based in the United States.
The Department of Justice claims the LockBit group extorted more than $500 million in ransom payments, with total losses, factoring in recovery and downtime, reaching into the billions.