top of page

LockBit 3.0 suffer a denial-of-service attack

Cyber security company Entrust became the victim of a ransomware attack this summer, with ransomware-as-a-service (RaaS) operator LockBit 3.0 claiming responsibility for the attack. But they then became a target themselves...

It is suspected that LockBit 3.0's attack antagonised a response from an Entrust supporter who retaliated with denial-of-service (DoS) attacks against the ransomware group’s leak site.

At present, LockBit 3.0 are the most widespread ransomware group in the world and began to leak Entrust’s data on Friday, August 19. The leak was promptly followed by the LockBit 3.0 leak site suffering a successful DoS attack that took their site offline.

The origin of the attack is still unknown, with the current rumours suggesting the retaliation was from Entrust, another threat group or law enforcement agencies.

This retaliation is not entirely unprecedented. LockBit 3.0 already have DDoS protection on their leak site and are likely familiar with attracting angry reactions due to the nature of their activities.

The firm have also been subjected to similar attacks from cybersecurity firm Accenture in 2021.

As retaliation to this attack, LockBit 3.0 are seeking to upload Entrust’s data to a torrent which would ensure the data will survive such attacks and always be available until the group chooses otherwise.

Multiple cyber security research groups have commented that if organisations begin to set precedence of retaliating in such a manner against ransomware operators, scenarios could develop dangerously.

However, these comments are caveated with the notion that it is likely the identity of who carried out the attacks may never be known.



Report all Fraud and Cybercrime to Action Fraud by calling 0300 123 2040 or online. Forward suspicious emails to Report SMS scams by forwarding the original message to 7726 (spells SPAM on the keypad).



The contents of blog posts on this website are provided for general information only and are not intended to replace specific professional advice relevant to your situation. The intention of East Midlands Cyber Resilience Centre (EMCRC) is to encourage cyber resilience by raising issues and disseminating information on the experiences and initiatives of others. Articles on the website cannot by their nature be comprehensive and may not reflect most recent legislation, practice, or application to your circumstances. EMCRC provides affordable services and Trusted Partners if you need specific support. For specific questions please contact us by email.


EMCRC does not accept any responsibility for any loss which may arise from reliance on information or materials published on this blog. EMCRC is not responsible for the content of external internet sites that link to this site or which are linked from it.

bottom of page