// Ransomware Negotiation Transcript
lockbit3.0 Ransomware Negotiation — Colonial General
// Context
About This Negotiation
This transcript documents a lockbit3.0 ransomware negotiation with Colonial General. The negotiation consisted of 25 messages exchanged over 1 day, beginning on 2022-11-23.
The initial ransom demand was Unknown. The final outcome is not confirmed in the transcript.
// Primary Source
Full Transcript — Verbatim
Reproduced from Casualtek's Ransomchats archive. URLs have been redacted.
Victim names are shown only where the breach was publicly reported in mainstream media. Any organisation wishing their name redacted can contact us at enquiries@binary-response.com — we will act promptly.
[Chat started]
Good day. I need assistance with decryption of files. Can you confirm the process please?
Are you there?
hi
to decrypt the data and avoid publication you need to pay us. we haven't published your name on our blog yet
what is the fee for the decryption ?
120k$
we will soon send you a tree of stolen data
USD?
yes
USD?
yes!
we stolen 85gb
Are you willing to drop the price of 120k?
no
can you send me the tree of stolen data so that I can confirm this data is ours?
Also, how doI get the funding to you
Yes, we'll send it soon.
You are sending in the chat window or to an email address?
I'll send you a link to our file sharing service
ok
[REDACTED URL]
I have to get the other personal id as these are not the files we were expecting
There is another machine from this breach that I would like the data for. I need a moment to get that personal ID file
If you don't pay, the files from the tree will be published. we don't care how you feel about them
// Analysis
Analyst Observations
- LockBit 3.0 was the most prolific ransomware group of 2022-2023, responsible for more attacks than any other group. Their infrastructure was taken down by Operation Cronos in February 2024.
- → LockBit 3.0 threat actor profile — TTPs, ransom demands, and active campaigns.