The infiltrators violated the Lockbit gang, approximately 60,000 bitcoin headlines leaked

Thousands of bitcoin addresses associated with the ransom payments that were processed through Lockbit after violating the group’s infiltrators violated the group’s database.
According to the Bleeping computer a reportThe unknown infiltrators hacked the dark online infrastructure from Lockbit, distorting their subsidiary paintings, and publicly shared a file that displays data from the group’s internal operations.
The leaked MySQL database appears to include years of ransom activity, revealing the details associated with the Lockbit management system.
Among the most important results, approximately 60,000 Bitcoin portfolio titles, which are believed to be linked to the ransom payments by the victims.
Information can help track how to move ransom boxes through Lukeon infrastructure.
The violation has also been confirmed by an unknown Lockbit player, as suggested by a conversation subscriber By one x user. However, the operator confirmed that no special keys were leaked.
Data that was leaked also included records of the Ransomware tools created by Lockbit Affiliats, details on how to target specific systems, and more than 4,400 special negotiating messages between the group and its victims, extending from December 2024 to April 2025.
It is still unknown to those who carried out the breach or how they obtained access to the Lockbit rear systems.
However, the investigators noted that a mutilation message left behind matching one used in a conversation Break From Everst Ransomware Group, indicating a possible connection between the two accidents.

A message left by Lockbit attackers. Source: Bleeping Computer
This breach comes after removing the main infrastructure in Lockbit in February 2024 under the operation of the CRONOS, which is a coordinated effort by the FBI, NCA, Europol and others.
During the raid, the authorities seized 34 servers, 1000 decoding key, access to Lockbit leakage sites, threatening to publish the stolen victim data.
The gang later managed to rebuild and resume activities, but this last settlement deepens the setbacks and distorted its reputation.
What is the Lockbit Ransomware gang?
Lockbit is among the most abundant ransom clothes as a RAS service, known as the targeting of large companies, hospitals and critical infrastructure.
Since its appearance in 2019, it has been said to have made more than $ 500 million from more than 2500 victims in 120 countries.
Among the victims targeted by the Boeing group, Royal Mail UK, ICBC and Capital Health.
The Group Form enables the implementation of attacks using Lockbitt tools, dividing the ransom with developers.
In December 2024, American authorities accused the Rostislav Panev, a double -Israeli Israeli citizen, of allegedly working as a developer for Lockbit Ransomware.
According to what was reported, he got more than $ 230,000 of the cryptocurrency for its role in creating harmful tools used in attacks.
Two Russian citizens, Artur Sonatov and Ivan Consetyev, were also accused in the United States for ransom attacks on American entities.
Meanwhile, Lukbet’s suspect leader, Dmitry Khoroshv, is still free. The United States has put a $ 10 million bonus for information that leads to his arrest.
The encryption industry is under attack
As I mentioned earlier by Invezz, Crypto Hacks exceeded in the first quarter alone $ 1.6 billion, making it the worst quarter in this industry.
The majority of these losses came from two attacks on the central exchanges, namely bybit, which lost $ 1.46 billion, and PHEMEX, which was hacked for $ 69.1 million.
While the Defi platforms represent only 6 % of the first quarter losses, March still has seen 20 separate accidents, including exploits on Abracadabra.Money, Zoth and ZKLEND, with a total of $ 33 million.
The post Hackers Breach Lockbit Gang, nearly 60,000 Bitcoin leaks first on Invezz