Summary: This article discusses the surge in cyberattacks using the leaked LockBit code, targeting various victims globally. It also explores the rise of new ransomware groups that are using modified versions of the leaked LockBit code.
Threat Actor: LockBit and various ransomware groups using the leaked LockBit code.…