Company Details
lockbitscl
4
746
541514
lockbits.cl
0
LOC_3276278
In-progress


Lockbits SpA Company CyberSecurity Posture
lockbits.clLockbits es una compañía chilena de seguridad informática que comercializa software de terceros (ESET, Microsoft) a través de un modelo de partnership, y que brinda valor a través de servicios de seguridad, de un excelente asesoramiento de venta consultiva y, a través de su servicio de post venta que es lo que los diferencia de la competencia, ya que brindan un servicio de elevada calidad y atención.
Company Details
lockbitscl
4
746
541514
lockbits.cl
0
LOC_3276278
In-progress
Between 650 and 699

Lockbits SpA Global Score (TPRM)XXXX

Description: Ransomware Attacks Hit Record Highs in 2025 Despite Major Disruptions A new study by Symantec and the Carbon Black Threat Hunter Team reveals that ransomware attacks surged to unprecedented levels in 2025, with threat actors adapting rapidly to law enforcement crackdowns and evolving their extortion tactics. The report documented 4,737 claimed ransomware attacks the highest annual total on record despite the collapse of two major operations. RansomHub, the most active group at the time, abruptly shut down in April 2025, causing a brief dip in activity. However, former affiliates quickly migrated to other groups, restoring attack volumes within weeks. LockBit (tracked as Syrphid) also failed to recover after late-2024 law enforcement actions. New leaders emerged to fill the void. Akira and Qilin each accounted for 16% of attacks, while Inc, Safepay, and the newly identified DragonForce contributed smaller but significant shares. The fluid movement of affiliates, access brokers, and tooling between groups sustained overall activity levels. Beyond traditional encryption-based ransomware, extortion campaigns without encryption surged in 2025. These attacks focused on data theft and public leaks pushed total extortion incidents to 6,182, a 23% increase from 2024. Snakefly’s Cl0p operation played a key role, exploiting vulnerabilities in enterprise software to target government and industrial sectors at scale. Social engineering also became a dominant attack vector, with groups like ShinyHunters and Scattered Spider using phone-based impersonation, credential harvesting, and OAuth abuse to breach cloud environments. Attackers tricked employees into authorizing malicious apps or sharing authentication codes, reducing reliance on malware. A new ransomware strain, Warlock, drew attention for its ties to older espionage tooling. Exploiting a zero-day in Microsoft SharePoint and using DLL sideloading, Warlock incorporated components linked to Chinese state-sponsored activity, blending ransomware with broader intrusion campaigns. Despite these shifts, attack chains remained consistent. Threat actors relied on "living off the land" techniques, leveraging PowerShell, remote management tools, and credential dumping to evade detection. Malware often appeared late in the intrusion, just before encryption or data theft. The findings underscore how ransomware operations continue to thrive, even as law enforcement disrupts key players, by diversifying extortion methods and exploiting shared infrastructure.


No incidents recorded for Lockbits SpA in 2026.
No incidents recorded for Lockbits SpA in 2026.
No incidents recorded for Lockbits SpA in 2026.
Lockbits SpA cyber incidents detection timeline including parent company and subsidiaries

Lockbits es una compañía chilena de seguridad informática que comercializa software de terceros (ESET, Microsoft) a través de un modelo de partnership, y que brinda valor a través de servicios de seguridad, de un excelente asesoramiento de venta consultiva y, a través de su servicio de post venta que es lo que los diferencia de la competencia, ya que brindan un servicio de elevada calidad y atención.


Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest s

CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk — endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-clas

## Our core business We manage linux / unix server infrastructures and build the efficient and secure networking environments using hardware cutting edge technologies suited to the needs of the project and the client. We believe in quality, opposed to quantity. Our company consists of highly
.png)
The LockBit ransomware crew is claiming to have stolen 78GB of data from Italy's tax agency and is threatening to leak it if a ransom isn't paid by July 31.
ERG SPA, an Italian energy company, reports a minor impact on its operations after the recent ransomware attack conducted by LockBit 2.0 gang.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Lockbits SpA is http://www.lockbits.cl.
According to Rankiteo, Lockbits SpA’s AI-generated cybersecurity score is 671, reflecting their Weak security posture.
According to Rankiteo, Lockbits SpA currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Lockbits SpA has been affected by a supply chain cyber incident involving QILIN, with the incident ID QILAKILOCDRASAF1768585619.
According to Rankiteo, Lockbits SpA is not certified under SOC 2 Type 1.
According to Rankiteo, Lockbits SpA does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Lockbits SpA is not listed as GDPR compliant.
According to Rankiteo, Lockbits SpA does not currently maintain PCI DSS compliance.
According to Rankiteo, Lockbits SpA is not compliant with HIPAA regulations.
According to Rankiteo,Lockbits SpA is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Lockbits SpA operates primarily in the Computer and Network Security industry.
Lockbits SpA employs approximately 4 people worldwide.
Lockbits SpA presently has no subsidiaries across any sectors.
Lockbits SpA’s official LinkedIn profile has approximately 746 followers.
Lockbits SpA is classified under the NAICS code 541514, which corresponds to Others.
No, Lockbits SpA does not have a profile on Crunchbase.
Yes, Lockbits SpA maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/lockbitscl.
As of January 23, 2026, Rankiteo reports that Lockbits SpA has experienced 1 cybersecurity incidents.
Lockbits SpA has an estimated 3,300 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Title: Ransomware Attacks Hit Record Highs in 2025 Despite Major Disruptions
Description: A new study by Symantec and the Carbon Black Threat Hunter Team reveals that ransomware attacks surged to unprecedented levels in 2025, with threat actors adapting rapidly to law enforcement crackdowns and evolving their extortion tactics. The report documented 4,737 claimed ransomware attacks, the highest annual total on record, despite the collapse of two major operations. Extortion campaigns without encryption also surged, pushing total extortion incidents to 6,182, a 23% increase from 2024.
Date Detected: 2025
Date Publicly Disclosed: 2025
Type: ransomware
Attack Vector: social engineeringzero-day exploitDLL sideloadingOAuth abusecredential harvestingphone-based impersonationvulnerability exploitation
Vulnerability Exploited: Microsoft SharePoint zero-dayenterprise software vulnerabilities
Threat Actor: RansomHubLockBit (Syrphid)AkiraQilinIncSafepayDragonForceSnakefly (Cl0p)ShinyHuntersScattered SpiderWarlock
Motivation: financial gaindata theftespionage
Common Attack Types: The most common types of attacks the company has faced is Ransomware.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through social engineeringzero-day exploitsvulnerabilities.

Data Compromised: 6,182 extortion incidents (23% increase from 2024)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personally Identifiable Information, Corporate Data and .

Entity Type: government, industrial, enterprise
Industry: government, industrial, cloud services

Type of Data Compromised: Personally identifiable information, Corporate data
Sensitivity of Data: high
Data Encryption: ['partial', 'none (extortion-only attacks)']

Ransomware Strain: RansomHubLockBitAkiraQilinIncSafepayDragonForceWarlock
Data Encryption: True
Data Exfiltration: True

Lessons Learned: Ransomware operations continue to thrive despite law enforcement disruptions by diversifying extortion methods, exploiting shared infrastructure, and leveraging social engineering and zero-day exploits.
Key Lessons Learned: The key lessons learned from past incidents are Ransomware operations continue to thrive despite law enforcement disruptions by diversifying extortion methods, exploiting shared infrastructure, and leveraging social engineering and zero-day exploits.

Source: Symantec and Carbon Black Threat Hunter Team Report
Date Accessed: 2025
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Symantec and Carbon Black Threat Hunter Team ReportDate Accessed: 2025.

Entry Point: Social Engineering, Zero-Day Exploits, Vulnerabilities,
High Value Targets: Government, Industrial Sectors,
Data Sold on Dark Web: Government, Industrial Sectors,

Root Causes: Law Enforcement Disruptions Leading To Affiliate Migration, Exploitation Of Zero-Day Vulnerabilities, Social Engineering Tactics, Living Off The Land Techniques,
Last Attacking Group: The attacking group in the last incident was an RansomHubLockBit (Syrphid)AkiraQilinIncSafepayDragonForceSnakefly (Cl0p)ShinyHuntersScattered SpiderWarlock.
Most Recent Incident Detected: The most recent incident detected was on 2025.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025.
Most Significant Data Compromised: The most significant data compromised in an incident were 6 and182 extortion incidents (23% increase from 2024).
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were 6 and182 extortion incidents (23% increase from 2024).
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Ransomware operations continue to thrive despite law enforcement disruptions by diversifying extortion methods, exploiting shared infrastructure, and leveraging social engineering and zero-day exploits.
Most Recent Source: The most recent source of information about an incident is Symantec and Carbon Black Threat Hunter Team Report.
.png)
Improper validation of specified type of input in M365 Copilot allows an unauthorized attacker to disclose information over a network.
Improper access control in Azure Front Door (AFD) allows an unauthorized attacker to elevate privileges over a network.
Azure Entra ID Elevation of Privilege Vulnerability
Moonraker is a Python web server providing API access to Klipper 3D printing firmware. In versions 0.9.3 and below, instances configured with the "ldap" component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be used to determine whether or not a search was successful, allowing for brute force methods to discover LDAP entries on the server such as user IDs and user attributes. This issue has been fixed in version 0.10.0.
Runtipi is a Docker-based, personal homeserver orchestrator that facilitates multiple services on a single server. Versions 3.7.0 and above allow an authenticated user to execute arbitrary system commands on the host server by injecting shell metacharacters into backup filenames. The BackupManager fails to sanitize the filenames of uploaded backups. The system persists user-uploaded files directly to the host filesystem using the raw originalname provided in the request. This allows an attacker to stage a file containing shell metacharacters (e.g., $(id).tar.gz) at a predictable path, which is later referenced during the restore process. The successful storage of the file is what allows the subsequent restore command to reference and execute it. This issue has been fixed in version 4.7.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.