{"id":172036,"date":"2023-09-14T16:35:19","date_gmt":"2023-09-14T21:35:19","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2023\/09\/when-lockbit-ransomware-fails-attackers-deploy-brand-new-3am"},"modified":"2023-09-14T16:35:19","modified_gmt":"2023-09-14T21:35:19","slug":"when-lockbit-ransomware-fails-attackers-deploy-brand-new-3am","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2023\/09\/when-lockbit-ransomware-fails-attackers-deploy-brand-new-3am","title":{"rendered":"When LockBit Ransomware Fails, Attackers Deploy Brand-New \u20183AM\u2019"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/when-lockbit-ransomware-fails-attackers-deploy-brand-new-3am.jpg\"><\/a><\/p>\n<p>In a recent attack against a construction company, hackers who failed to execute LockBit in a target network were observed deploying a second, never-before-seen ransomware, which managed to break through.<\/p>\n<p>The new tool is rather standard fare, blocking various cybersecurity and backup-related software before locking up files on its host computer. But it distinguishes itself with an adorable little theme: 3 a.m., a time when perhaps only insomniacs, hardcore night owls, and black hat hackers are still up and working away.<\/p>\n<p><a href=\"https:\/\/symantec-enterprise-blogs.security.com\/blogs\/threat-intelligence\/3am-ransomware-lockbit\" target=\"_blank\">In a report this week<\/a>, researchers from Symantec described the first observed use of 3AM \u2014 a double-whammy attack in which the LockBit ransomware was blocked but then 3AM squeaked through in one compromised machine.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a recent attack against a construction company, hackers who failed to execute LockBit in a target network were observed deploying a second, never-before-seen ransomware, which managed to break through. The new tool is rather standard fare, blocking various cybersecurity and backup-related software before locking up files on its host computer. But it distinguishes itself [\u2026]<\/p>\n","protected":false},"author":662,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-172036","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/172036","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/662"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=172036"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/172036\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=172036"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=172036"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=172036"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}