Ransomware Giants Exposed: LockBit Administration Panel Breach Unveils Criminal Operations
A significant security breach has revealed the inner workings of one of the world's most notorious ransomware operations. On May 7, security researchers discovered that unknown hackers had compromised a LockBit administration panel, exposing critical information about the criminal enterprise's activities.

A significant security breach has revealed the inner workings of one of the world's most notorious ransomware operations. On May 7, security researchers discovered that unknown hackers had compromised a LockBit administration panel, exposing critical information about the criminal enterprise's activities.
The intrusion became public when a LockBit-associated domain was defaced with the message "Don't do crime, crime is bad xoxo from Prague" alongside a downloadable archive containing sensitive data from the compromised server.
This data treasure trove includes private negotiations between LockBit affiliates and their victims, cryptocurrency wallet addresses, account credentials, attack details, and information about the group's malware infrastructure. Security analysts believe this intelligence will provide valuable insights for both law enforcement and cybersecurity defenders.
Christiaan Beek from Rapid7 highlighted the particular value of the exposed Bitcoin addresses for investigators tracking financial flows. Meanwhile, Searchlight Cyber's analysis identified 76 user records including login credentials potentially belonging to LockBit affiliates or administrators.
"The user data reveals interesting connections through TOX messaging IDs," explained Luke Donovan of Searchlight Cyber. "We've already linked three leaked users to specific aliases on hacking forums through matching TOX IDs, which helps us understand their recruitment and operational patterns."
The leaked archive contains 208 victim negotiations spanning December 2024 through April 2025, demonstrating the ransomware group's aggressive tactics. Ransom demands varied widely, from modest sums of a few thousand dollars to demands reaching $100,000, depending on the target.
Interestingly, the defacement message matches one used in a recent hack against another ransomware operation called Everest, suggesting possible infighting within cybercriminal communities rather than a law enforcement operation.
LockBit acknowledged the breach on May 8 through their leak site but attempted to downplay its significance, claiming that victim data and decryption tools remained secure. The group's alleged leader, identified by authorities as Russian national Dmitry Yuryevich Khoroshev (known online as LockBitSupp), has reportedly offered payment for information identifying the perpetrators.
Despite major disruption efforts by international law enforcement agencies last year, LockBit continues to represent a significant threat to organizations worldwide. This latest breach, however, may provide crucial intelligence to help authorities further dismantle the criminal operation's networks.