{"id":6772,"date":"2024-01-29T12:32:52","date_gmt":"2024-01-29T12:32:52","guid":{"rendered":"\/cybersecurity-blog\/?p=6772"},"modified":"2025-01-31T06:55:47","modified_gmt":"2025-01-31T06:55:47","slug":"lockbit-ransomware-attack","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/lockbit-ransomware-attack\/","title":{"rendered":"LockBit Ransomware Attack on Calvi\u00e0: a Recent Reminder Why Organizations Need Strong Cybersecurity Basics\u00a0"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p>Ransomware groups are becoming bolder, targeting both government and corporate entities. At <a href=\"http:\/\/any.run\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=lockbit&amp;utm_content=landing&amp;utm_term=290124\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>, our sandbox is used by over 300,000 researchers who process tens of thousands of malware submissions every day, including ransomware. In this article we\u2019ll aim to provide insight into the Calvi\u00e0 city attack and share information about the threat encountered.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What happened in Calvi\u00e0?&nbsp;<\/h2>\n\n\n\n<p>You might have heard that in Majorca, Spain, the city of Calvi\u00e0, a key tourist destination, has been hit by a ransomware attack, causing significant disruption to its municipal services.&nbsp;<\/p>\n\n\n\n<p>Calvi\u00e0, with a population of 50,000 and an annual tourist influx of 1.6 million visitors, has faced IT outages leading to the suspension of all administrative deadlines for submissions and requests until January 31, 2024.&nbsp;<\/p>\n\n\n\n<p>Although no major ransomware group has claimed responsibility for the attack, local media reports indicate the attackers demanded \u20ac10 million (about $11 million). The mayor has stated that the city will not pay the ransom.&nbsp;<\/p>\n\n\n\n<p>Despite the challenge, we at ANY.RUN consistently advise against complying with cybercriminals&#8217; demands. Doing so only encourages them to continue their harmful activities.&nbsp;<\/p>\n\n\n\n<p>The city&#8217;s mayor, Juan Antonio Amengual, revealed that IT specialists are working on a forensic analysis to understand the full scope of the breach and recover affected systems.&nbsp;<\/p>\n\n\n\n<p>At this point, we know that the threat Calvi\u00e0 municipality faced was the Lo\u0441kBit ransomware.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is LockBit Ransomware?&nbsp;<\/h2>\n\n\n\n<p>LockBit is a ransomware that primarily targets Windows computers but can also encrypt files on Linux and MacOS machines. It is operated by a hacker group that promotes it as the &#8220;fastest encryption software in the world.&#8221; LockBit is a Ransomware-as-a-Service (RaaS) operation, where they sell access to their ransomware on underground forums, contributing to its widespread use \u2014 this means that it is likely the attack on Calvi\u00e0 wasn\u2019t specifically carried out personally by LockBit creators, but rather by someone who bought access to a control panel from them.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nGet the latest\n <span class=\"highlight\"> LockBit IOCs <\/span>from ANY.RUN\u2019s Malware Trends Tracker\u00a0&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/malware-trends\/lockbit\/\" rel=\"noopener\" target=\"_blank\">\nCollect IOCs\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p>What\u2019s more, LockBit is known for maintaining a professional-looking website and even running a bug bounty program \u2014 they have very strong marketing effort for a ransomware.&nbsp;<\/p>\n\n\n\n<p>Once it infiltrates a system, LockBit uses various tools to carry out its attack, including credential gathering, disabling security products, and propagating within networks. It exfiltrates data using cloud storage tools and then initiates file encryption using AES encryption with RSA keys. Like many ransomware strains, LockBit replaces the desktop wallpaper with a ransom note:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"561\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-8-1024x561.png\" alt=\"\" class=\"wp-image-6774\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-8-1024x561.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-8-300x165.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-8-768x421.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-8-370x203.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-8-270x148.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-8-740x406.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-8.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>If you want to better understand how LockBit works and collect LockBit IOCs, check out <a href=\"https:\/\/app.any.run\/tasks\/2c21ba6b-99f9-431f-9f5b-1f265485da6c?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=lockbit&amp;utm_content=task&amp;utm_term=290124\" target=\"_blank\" rel=\"noreferrer noopener\">this LockBit ransomware analysis in ANY.RUN.<\/a>\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">LockBit\u2019s popularity is spiking&nbsp;<\/h2>\n\n\n\n<p>Looking at ANY.RUN\u2019s <a href=\"https:\/\/any.run\/malware-trends\" target=\"_blank\" rel=\"noreferrer noopener\">Malware Trends Tracker<\/a> we can see that <a href=\"https:\/\/any.run\/malware-trends\/lockbit\" target=\"_blank\" rel=\"noreferrer noopener\">LockBit<\/a> is currently ranked 19 as the most popular malware overall. This is high for ransomware \u2014 this type isn\u2019t as popular as, for example, loaders or stealers.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"477\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-7-1024x477.png\" alt=\"\" class=\"wp-image-6773\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-7-1024x477.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-7-300x140.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-7-768x358.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-7-1536x715.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-7-370x172.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-7-270x126.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-7-740x345.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-7.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>We also observe an increase in usage activity on this 30-day graph, which roughly corresponds to the Calvi\u00e0 attack. Additionally, we notice another recent spike. High number of detections shows that users are quite interested in Lockbit.&nbsp;<\/p>\n\n\n\n<p>The Malware Trends Tracker displays the number of tasks executed in the ANY.RUN sandbox when malware, such as LockBit in this case, was detected using our detection rules and tagged. An increase in detections indicates that more researchers are encountering this threat in the wild&nbsp;<\/p>\n\n\n\n<p>What&#8217;s noteworthy is that LockBit isn&#8217;t typically employed in this manner. Its primary targets are usually small to medium-sized businesses, with an average ransom demand of approximately $85,000. It&#8217;s somewhat unusual to witness this threat being deployed on such a large scale.&nbsp;<\/p>\n\n\n\n<p>Does this suggest that LockBit might become more popular among APTs and be utilized in high-complexity, high-stakes ransomware attacks? Perhaps this is a trend worth monitoring.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What could have caused the attack?&nbsp;<\/h2>\n\n\n\n<p>While the emergency IT committee in Calvi\u00e0 is still investigating the incident, we cannot be certain about the exact cause of this attack. However, we can make some educated guesses based on our general knowledge of LockBit.&nbsp;<\/p>\n\n\n\n<p>To get inside a system, LockBit affiliates may leverage phishing, or VPN&nbsp;and RDP brute force credentials as an initial access. In certain cases, LockBit exploits software vulnerabilities.&nbsp;<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><strong>Spearphishing:<\/strong> In this scenario, one of the employees of the affected system might have fallen victim to a spearphishing attack, where they unknowingly open a malicious email. This email could contain a link or attachment that, once clicked or downloaded, installs malware on their system, giving attackers access.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li><strong>Use of unpatched software<\/strong>: Another possible route to the infection could be the presence of unpatched software on one of the machines within the organization. The attacker could have exploited a vulnerability in this software to gain access.&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>It&#8217;s important to note that at this point, these are only speculations and should be taken with caution.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What can organizations do to prevent similar attacks?&nbsp;<\/h2>\n\n\n\n<p>Without knowing the specific details of the attack, the only recommendations we can provide at this point are general ones related to proper online hygiene, system management, and employee security training.&nbsp;<\/p>\n\n\n\n<p>Not to beat a dead horse, but these basic measures can significantly enhance cybersecurity. Unfortunately, not all organizations adhere to them, which creates opportunities for cybercriminals. &nbsp;<\/p>\n\n\n\n<p><strong>Here&#8217;s what you can do to improve security:&nbsp;<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Employee training<\/strong>: conduct regular cybersecurity awareness training for employees to help them avoid phishing.&nbsp;<\/li>\n\n\n\n<li><strong>Patch management<\/strong>: Keep all software and systems up-to-date with the latest security patches and updates to minimize vulnerabilities.&nbsp;<\/li>\n\n\n\n<li><strong>Strong authentication<\/strong>: enforce the use of strong, unique passwords and implement multi-factor authentication wherever possible.&nbsp;<\/li>\n\n\n\n<li><strong>Access control<\/strong>: Limit access to critical systems and data to only those who need it for their job roles.&nbsp;<\/li>\n\n\n\n<li><strong>Regular backups<\/strong>: Regularly back up data and store it in isolation from the main network.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><strong>About ANY.RUN<\/strong>&nbsp;<\/p>\n\n\n\n<p>ANY.RUN is a cloud malware sandbox that handles the heavy lifting of malware analysis for SOC and DFIR teams. Every day, 300,000 professionals use our platform to investigate incidents and streamline threat analysis of Windows and Linux tasks.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>Request a demo today and enjoy 14 days of free access to our Enterprise plan.&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=lockbit&amp;utm_content=trial&amp;utm_term=290124\" target=\"_blank\" rel=\"noreferrer noopener\">Request demo \u2192<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware groups are becoming bolder, targeting both government and corporate entities. At ANY.RUN, our sandbox is used by over 300,000 researchers who process tens of thousands of malware submissions every day, including ransomware. In this article we\u2019ll aim to provide insight into the Calvi\u00e0 city attack and share information about the threat encountered.&nbsp; What happened [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":6776,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,60],"tags":[15,40,74],"class_list":["post-6772","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lifehacks","category-news","tag-malware","tag-malware-behavior","tag-malware-news"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>LockBit Ransomware Attack on Calvi\u00e0 - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"In this post we\u2019ll aim to provide insight into the Calvi\u00e0 city LockBit ransomware attack and share information about the threat encountered.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/lockbit-ransomware-attack\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/lockbit-ransomware-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/lockbit-ransomware-attack\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"LockBit Ransomware Attack on Calvi\u00e0: a Recent Reminder Why Organizations Need Strong Cybersecurity Basics\u00a0\",\"datePublished\":\"2024-01-29T12:32:52+00:00\",\"dateModified\":\"2025-01-31T06:55:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/lockbit-ransomware-attack\/\"},\"wordCount\":1076,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"malware\",\"malware behavior\",\"malware news\"],\"articleSection\":[\"Cybersecurity Lifehacks\",\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/lockbit-ransomware-attack\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/lockbit-ransomware-attack\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/lockbit-ransomware-attack\/\",\"name\":\"LockBit Ransomware Attack on Calvi\u00e0 - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2024-01-29T12:32:52+00:00\",\"dateModified\":\"2025-01-31T06:55:47+00:00\",\"description\":\"In this post we\u2019ll aim to provide insight into the Calvi\u00e0 city LockBit ransomware attack and share information about the threat encountered.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/lockbit-ransomware-attack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/lockbit-ransomware-attack\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/lockbit-ransomware-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Lifehacks\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/lifehacks\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"LockBit Ransomware Attack on Calvi\u00e0: a Recent Reminder Why Organizations Need Strong Cybersecurity Basics\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LockBit Ransomware Attack on Calvi\u00e0 - ANY.RUN&#039;s Cybersecurity Blog","description":"In this post we\u2019ll aim to provide insight into the Calvi\u00e0 city LockBit ransomware attack and share information about the threat encountered.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/lockbit-ransomware-attack\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/lockbit-ransomware-attack\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/lockbit-ransomware-attack\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"LockBit Ransomware Attack on Calvi\u00e0: a Recent Reminder Why Organizations Need Strong Cybersecurity Basics\u00a0","datePublished":"2024-01-29T12:32:52+00:00","dateModified":"2025-01-31T06:55:47+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/lockbit-ransomware-attack\/"},"wordCount":1076,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["malware","malware behavior","malware news"],"articleSection":["Cybersecurity Lifehacks","News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/lockbit-ransomware-attack\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/lockbit-ransomware-attack\/","url":"https:\/\/any.run\/cybersecurity-blog\/lockbit-ransomware-attack\/","name":"LockBit Ransomware Attack on Calvi\u00e0 - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2024-01-29T12:32:52+00:00","dateModified":"2025-01-31T06:55:47+00:00","description":"In this post we\u2019ll aim to provide insight into the Calvi\u00e0 city LockBit ransomware attack and share information about the threat encountered.\u00a0","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/lockbit-ransomware-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/lockbit-ransomware-attack\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/lockbit-ransomware-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Lifehacks","item":"https:\/\/any.run\/cybersecurity-blog\/category\/lifehacks\/"},{"@type":"ListItem","position":3,"name":"LockBit Ransomware Attack on Calvi\u00e0: a Recent Reminder Why Organizations Need Strong Cybersecurity Basics\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/6772"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=6772"}],"version-history":[{"count":3,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/6772\/revisions"}],"predecessor-version":[{"id":11390,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/6772\/revisions\/11390"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/6776"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=6772"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=6772"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=6772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}