![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxUonlMxMgT7OQkZZfEPCf019hT-EW2sn8RyBw_EhyXLcWUtft3I-sEvlrJuUeY07Ig0WDxRLT37GYtoYjkRGApjxkiEwTamxt8jSmfJL2knlCmATBOu4HjfwD-vYn9taFQ-2uca1x6UhDg68rBLR0jAf4hFZ-1MkEVmwH6Q6QUBEyKnAqLzcNWrxQAS83/s1600/lockbit.jpg)
The leak of the LockBit 3.0 ransomware builder last year has led to threat actors abusing the tool to spawn new variants.
Russian cybersecurity company Kaspersky said it detected a ransomware intrusion that deployed a version of LockBit but with a markedly different ransom demand procedure.
“The attacker behind this incident decided to use a different ransom note with a headline related to a
Source:: The Hackers News