The cyber criminals are thought to be linked to Russia. In August last year they attempted to extort a school in Leeds for information about the children, particularly about special educational needs. LockBit functions as a Ransomware-as-a-Service (RaaS) model where affiliates are recruited to conduct ransomware attacks using LockBit ransomware tools and infrastructure, with the main gang taking a cut of the affiliates’ earnings.
On Monday evening, a message appeared on LockBit's website, saying it was "now under control of law enforcement".
The NCA's technical experts had been able to get inside of LockBit's own systems and take control. In doing so, they were able to steal a large amount of the criminal group's own data about its activities.
Since many companies do not admit they have been hacked and sometimes pay a ransom, this data may well provide a unique insight into the true scale of the group's work as well.
Source of information: BBC News: LockBit: UK leads disruption of major cyber-criminal gang
Further information reported by Computing says that the United States Department of Justice unsealed indictments against two alleged members of the LockBit ransomware group, as part of a broader global operation aimed at dismantling the criminal enterprise. The number of LockBit members currently charged is five. Details about the crimes and charges can be read: Computing: US Charges Russian Nationals
Disruption to the LockBit operation is significantly greater than first revealed. As well as taking control of the LockBit website, Lockbit's primary administration environment, the NCS has also seized the infrastructure that allowed it to manage and deploy the technology that it used to extort businesses and individuals around the world:
The Guardian: Seized ransomware network LockBit rewired to expose hackers to the world
What to do in the event of a Cyber Attack
Incidents or attacks where any security breaches may have taken place, or other damage was caused, should be reported to an external body.
The SLT digital lead will be responsible for assigning someone to report any suspicious cyber incidents or attacks. This person will need to report this to:
- Action Fraud on 0300 123 2040, or the Action Fraud website
- the DfE sector cyber team at
This email address is being protected from spambots. You need JavaScript enabled to view it.
You may also need to report to:
- the NCSC website if the incident or attack causes long term school closure, the closure of more than one school, or serious financial damage
- the ICO website within 72 hours, where a high risk data breach has or may have occurred
- your cyber insurance provider (if you have one), such as risk protection arrangement (RPA)
- Jisc, if you are a part of a further education institution
You must act in accordance with:
- Action Fraud guidance for reporting fraud and cyber crime
- Academy Trust Handbook Part 6, if you are part of an academy trust
- ICO requirements for reporting personal data breaches
Police investigations may find out if any compromised data has been published or sold and identify the perpetrator.
m. Preserving evidence is as important as recovering from the crime.
Forward suspicious emails to