Two years ago today, on February 20, 2024, the UK’s National Crime Agency and the FBI announced Operation Cronos, a coordinated international law enforcement action that dismantled the infrastructure of LockBit, the world’s most prolific ransomware operation. The operation represented the most significant action against ransomware to date, seizing control of the group’s leak site and using it to publish information about the criminal operation.

Operation scope

MetricResult
Countries involved10
Lead agenciesNCA (UK), FBI (US)
Servers seized34
Affiliates identified194
Accounts taken down14,000+
Cryptocurrency frozen$112 million (2,200 BTC)
Decryption keys obtained1,000+

Participating countries

CountryAgency
United KingdomNational Crime Agency
United StatesFBI, DOJ
FranceGendarmerie Nationale
GermanyBKA
NetherlandsDutch Police
AustraliaAFP
CanadaRCMP
JapanNPA
SwedenSwedish Police
Switzerlandfedpol

LockBit’s reign

Before the takedown, LockBit dominated the ransomware landscape:

By the numbers

MetricValue
Global ransomware share~25% of all attacks
US attacks (2020-2024)~1,700
Total ransom collected$500+ million
Countries affected120+
Sector targetingIndiscriminate

Notable victims

OrganizationYearImpact
Royal Mail (UK)2023International shipping halted
Boeing202343GB data leaked
ICBC (China)2023Largest bank ransomware attack
Allen & Overy2023Major law firm compromised
Multiple hospitals2020-2024Healthcare disruptions

The takedown

Technical seizure

ComponentAction
Primary leak siteSeized and repurposed
Admin panelLaw enforcement controlled
Affiliate infrastructure34 servers taken down
Communication channelsCompromised
Source codeObtained

Creative law enforcement

In an unprecedented move, law enforcement repurposed LockBit’s leak site to publish information about the criminal operation:

Content postedPurpose
Affiliate identitiesExpose criminal network
Operation detailsDemonstrate compromise depth
Decryption tool announcementsHelp victims
Countdown timersMock LockBit’s own tactics
Admin identity revealPsychological pressure

The agencies used LockBit’s own intimidation tactics against them, posting countdown timers to the reveal of the group’s administrator identity.

Identifying LockBitSupp

Dmitry Khoroshev unmasked

On May 7, 2024, law enforcement revealed the identity of LockBit’s administrator, known as “LockBitSupp”:

DetailInformation
NameDmitry Yuryevich Khoroshev
NationalityRussian
Age31 (at time of identification)
RoleLockBit creator and administrator
Reward offered$10 million

Sanctions and charges

ActionDetails
US Treasury sanctionsAssets frozen, transactions prohibited
UK sanctionsParallel asset freeze
Criminal indictment26 counts including extortion, fraud
Travel restrictionsInternational arrest warrant

Khoroshev remains at large in Russia, which does not extradite citizens to Western countries.

Arrests and prosecutions

Individuals charged

IndividualCountryStatus
Mikhail VasilievCanada/RussiaArrested, extradited to US
Ruslan AstamirovRussiaArrested in Arizona
Mikhail MatveevRussiaIndicted, at large
Artur SungatovRussiaIndicted, at large
Ivan KondratyevRussiaIndicted, at large
Two affiliatesPoland, UkraineArrested February 2024

Prosecution outcomes

CaseResult
Mikhail VasilievPleaded guilty, sentenced to 4 years
Multiple affiliatesOngoing prosecutions

Victim recovery

Decryption assistance

ResourceAvailability
Decryption keys1,000+ obtained
No More Ransom portalFree decryption tools
FBI victim outreachDirect assistance offered
Estimated recovery valueHundreds of millions

Law enforcement obtained encryption keys from seized infrastructure, enabling victims to recover data without paying ransoms.

LockBit’s attempted comeback

Despite the takedown, LockBit attempted to resume operations within days:

Resilience efforts

ActionResult
New leak siteLaunched within week
Defiant messagingClaimed minimal impact
RecruitmentAttempted to attract new affiliates
OperationsSignificantly degraded

Diminished capability

MetricBefore CronosAfter Cronos
Monthly attacks100+Significantly reduced
Affiliate count194 identifiedMany departed
ReputationDominant brandTrust damaged
InfrastructureRobustCompromised

The takedown did not eliminate LockBit, but significantly degraded its operations and reputation. The exposure of affiliate identities and administrator information damaged trust within the criminal ecosystem.

Lessons for ransomware defense

What worked

FactorImpact
International cooperation10 countries coordinated effectively
Technical capabilityComplete infrastructure compromise
Psychological operationsUsing criminals’ tactics against them
TransparencyPublic disclosure of operation details

What remains challenging

ChallengeStatus
Russian safe havenOperators beyond arrest reach
Ransomware ecosystemOther groups continue operating
Affiliate modelDecentralized structure provides resilience
CryptocurrencyEnables ransom payments

Impact on ransomware landscape

Immediate effects

EffectDuration
LockBit disruptionSignificant, months
Affiliate migrationMany moved to other groups
Temporary attack reductionBrief overall decrease

Long-term implications

ImplicationAssessment
Deterrence valueDemonstrates law enforcement capability
RaaS trustAffiliates now question operator security
Investment in takedownsJustified by Cronos success
Collaboration modelTemplate for future operations

Context

Operation Cronos demonstrated that even the most sophisticated ransomware operations can be dismantled through coordinated international law enforcement action. The creative approach—using LockBit’s own infrastructure against them and publicly mocking the criminal operation—added psychological impact to the technical disruption.

However, the operation also illustrated the limitations of enforcement against ransomware:

LimitationReality
Safe havensRussian operators remain beyond reach
Ecosystem resilienceOther groups absorbed displaced affiliates
Business modelRansomware-as-a-service continues
Recovery challengesMany victims still unrecoverable

Two years later, ransomware remains a significant threat, but Operation Cronos established a template for future international cooperation against cybercriminal infrastructure. The $10 million reward for Khoroshev’s arrest remains outstanding, a reminder that the most consequential actors in the ransomware ecosystem continue to operate with impunity from jurisdictions that refuse to cooperate with Western law enforcement.

For organizations, the takedown reinforces that prevention remains more reliable than hoping for law enforcement intervention. While operations like Cronos help, they cannot eliminate the ransomware threat. Robust backups, network segmentation, and incident response capabilities remain essential.