Lockbit attacks Cross City Tunnels
Date:
June 7, 2023
Overview
Title
Lockbit attacks Cross City Tunnels
Victim
Cross City Tunnel
Attacker
LockBit
Location
Size of Attack
Unknown/TBD
First Reported
June 7, 2023
Last Updated
October 31, 2022
The Lockbit ransomware gang has allegedly attacked Cross City Tunnels. Lockbit posted Cross City Tunnels’ details on its data leak site on June 5th, stating that the stolen information would be published on June 26th if Cross City Tunnels failed to pay the ransom. The Cross City Tunnel is a twin-road tunnel tollway located in Sydney, Australia. It is 2.1km long and was opened in August 2005. It links Darlin Harbor to Rushcutters Bay, is owned by the government of New South Wales, and is run by Transurban. The organization has neither confirmed nor denied the attack. LockBit has been active since 2019 and is enabled with security tool evasion capabilities and an extremely fast encryption speed. LockBit is noted for using a triple extortion model where the victim may also be asked to purchase their sensitive information in addition to paying the ransom demand for decrypting systems. LockBit is considered to have been the most active attack group in 2022 as other high-profile groups became less active and demanded ransoms of more than $50 million. LockBit tends to target larger enterprises across any industry vertical with the ability to pay high ransom demands but also tends to favor Healthcare targets.
This attack's description was not found, while we work on the detailed account of this attack we invite you to browse through other recent Rasomware Attacks in the table below.
Recent Ransomware Attacks
The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.
The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.