![]() | |
Formation | 2019 |
---|---|
Type | Cybercrime |
LockBit is acybercriminal group proposingransomware as a service (RaaS). Software developed by the group (also calledransomware) enables malicious actors who are willing to pay for using it to carry out attacks in two tactics where they not onlyencrypt the victim's data and demand payment of aransom, but also threaten toleak it publicly if their demands are not met.[1]
According to a joint statement by various government agencies, LockBit was the world's most prolific ransomware in 2022.[2] It was estimated in early 2023 to be responsible for 44% of all ransomware incidents globally.[3]
In the United States between January 2020 and May 2023, LockBit was used in approximately 1,700 ransomware attacks, withUS$91 million paid in ransom to hackers.[4]
Government agencies did not formally attribute the group to any nation-state.[5] Software with the name "LockBit" appeared on a Russian-language based cybercrime forum in January 2020.[4] The group is financially motivated.[3] However, in an interview on Inside Darknet, members claimed they are not Russian.[6]
In February 2024 law enforcement agencies seized control of LockBitdark web sites used for attacks.[7][8] However, further attacks with LockBit ransomware were later reported, with the group attempting to perform a comeback.[9][10]
LockBit software, written in theC andC++ programming languages until.NET was used for the LockBit-NG-Dev under development at takedown in 2024,[9] gains initial access to computer systems using purchased access,unpatchedvulnerabilities, insider access, andzero-day exploits, in the same way as other malware. LockBit then takes control of the infected system, collectsnetwork information, and steals and encrypts data. Demands are then made for the victim to pay a ransom for their data to be decrypted so that it is again available, and for the perpetrators to delete their copy, with the threat of otherwise making the data public.[11] (While the data are not published if the ransom is paid, it was found when LockBit was taken down by law enforcement that it had not been deleted.[12])
LockBit gained attention for its creation and use of themalware called "StealBit", which automates transferring data to the intruder. This tool was introduced with the release of LockBit 2.0, which has fast and efficient encryption capabilities. To expand their reach, LockBit also released Linux-ESXI Locker version 1.0, targetingLinux hosts, particularlyVMware ESXi servers.[1]
LockBit recruits affiliates and develops partnerships with other criminal groups. They hire network access brokers, cooperate with organizations like Maze, and recruitinsiders from targeted companies. To attract talentedhackers, they have sponsored underground technical writing contests.[1]
LockBit has targeted various industries globally, however, healthcare and education sectors are the biggest victims. According toTrend Micro, in terms of attack attempts, United States, India and Brazil are the top targeted countries.[1]
LockBit is efficient and adaptable: they emphasize their malware's speed and capabilities to attract victims. They take external factors like data privacy laws into consideration when targeting potential victims. LockBit's success also relies heavily on their affiliate program, which helps them innovate and compete in the ransomware landscape.[1]
On its site on the dark web, LockBit stated that it was "located in the Netherlands, completely apolitical and only interested in money".[13]
LockBit operators frequently gain initial access by exploiting vulnerableRemote Desktop Protocol (RDP) servers or compromised credentials purchased from affiliates. Initial access vectors also includephishing emails with malicious attachments or links,brute-forcing weak RDP orVPN passwords, and exploiting vulnerabilities such as CVE-2018-13379 inFortinet VPNs.[1]
Once installed, LockBit ransomware is often executed inMicrosoft Windows viacommand-line arguments,scheduled tasks, orPowerShell scripts such as PowerShell Empire. LockBit uses tools such asMimikatz, GMER, Process Hacker, and registry edits to gathercredentials, disable security products, and evade defenses. It enumerates network connections to identify high-value targets such asdomain controllers using scanners such as Advanced Port Scanner.[1]
Forlateral movement, LockBit spreads throughSMBfile-sharing connections inside networks, using credentials gathered earlier. Other lateral movement techniques include distributing itself via compromisedGroup Policy objects, or using tools such as PsExec orCobalt Strike.[1]
LockBit's ransomware payload encrypts files and network shares usingAES andRSA encryption. It encrypts only the first fewkilobytes of each file for faster processing, and adds a ".lockbit" extension. LockBit then replaces the desktop wallpaper with a ransom note; it can also print ransom notes to attached printers. The goal is to extort payment of a ransom to reverse system disruption and restore file access.[1]
LockBitmalware was previously known as ".abcd", after the file extension that was added to encrypted files as they were made inaccessible.[14]
LockBit was first observed in September 2019.[15]
LockBit 2.0 appeared in 2021[15] and came into the spotlight with their attack onAccenture the same year, where an insider probably helped the group entering the network. LockBit published some of the data stolen in this attack.[16][1]
In January 2022, the electronics companyThales was one of the victims of Lockbit 2.0.[17]
In July 2022, the administrative and management services ofLa Poste Mobile were attacked.[18]
In September 2022, the group's hackers claimed cyberattacks against 28 organizations, 12 of which involved French organizations.[19] Among them, theCorbeil Essonnes hospital was targeted with a ransom demand of US$10 million.[20]
In October 2022, the LockBit group claimed responsibility for an attack onPendragon PLC, a group of automotive retailers in the UK, demanding a ransom of US$60 million to decrypt the files and not leak them; the company stated that they refused the demand.[21]
On October 31, 2022, the LockBit hacker group claimed to have attacked Thales Group for the second time and did not demand a ransom, but said that the data would be released. The hacker group offered assistance to Thales customers affected by the theft, in order to lodge a complaint against Thales, a group "that has greatly disregarded confidentiality rules".[22] On November 10, 2022, the LockBit 3.0 group published on the darknet a 9.5 GB archive with stolen information on Thales contracts in Italy and Malaysia.[23][24]
In November 2022, OEHC -Office d'Équipement Hydraulique de Corse - was the victim of a cyberattack that encrypted the company's computer data. A ransom demand was made by the hacker group, to which OEHC did not respond.[25]
In December 2022, the LockBit hacker group claimed responsibility for the attack on theCalifornia Finance Administration. The governor's office acknowledged being the victim of an attack, without specifying its scale. Lockbit claims to have stolen 246,000 files with a total size of 75.3 GB.[26]
In December 2022, the hacker group claimed to have attacked theport of Lisbon. The ransom was set at US$1.5 million, to be paid by January 18, 2023.[27]
On December 18, 2022, a group of hackers attackedToronto'sHospital for Sick Children. After realizing their blunder, the hacker group stopped the attack, apologized and offered a free solution to recover the encrypted files.[28] In a subsequent interview, LockBit members stated they have a policy against attacking hospitals.[29]
In late June 2022, the group launched "LockBit 3.0", the latest variant of their ransomware, after two months ofbeta testing. Notably, the group introduced abug bounty program, the first of its kind in the realm of ransomware operations. They invited security researchers to test their software to improve their security, offering substantial monetary rewards ranging fromUS$1,000 to $1 million.[1]
In August 2022, German equipment manufacturerContinental suffered a LockBit ransomware attack. In November 2022, with no response to its ransom demand, the hacker group published part of the stolen data and offered access to all of it for 50 million euros. Among the stolen data are the private lives of the Group's employees, as well as exchanges with German car manufacturers. Beyond the theft of data, the danger lies in opening the way to industrial espionage. Indeed, among the exchanges withVolkswagen are IT aspects, from automated driving to entertainment, in which Volkswagen wanted Continental to invest.[30]
In November 2022, theUnited States Department of Justice announced the arrest of Mikhail Vasiliev, a dual Russian and Canadian national, in connection with the LockBit ransomware campaign. According to the charges, Vasiliev allegedly conspired with others involved in LockBit, a ransomware variant that had been used in over 1,000 attacks globally as of November 2022. According to reports, the operators of LockBit had made at least $100 million in ransom demands, of which tens of millions had been paid by victims. The arrest followed a 2.5 year investigation into the LockBit ransomware group by the Department of Justice.[31]
In January 2023, the hacker group claimed to have attacked the French luxury goods companyNuxe[32] and ELSAN, a French group of private clinics. The hacker group filched 821 GB of data from the company's headquarters.[33] The same month,Royal Mail's international export services were severely disrupted by a Lockbit ransomware attack.[34][35]
In February 2023, the group claimed responsibility for an attack onIndigo Books and Music, a chain of Canadian bookstores.[36]
In March 2023, the group claimed responsibility for attackingBRL Group [fr], a water specialist in France.[37]
On May 16, 2023, the hacker group claimed responsibility for attacking the Hong Kong branch of the Chinese newspaperChina Daily. This is the first time the hacker group has attacked a Chinese company. LockBit does not attack Russian entities and avoids attacking Russian allies.[38]
In May 2023, the hacker group claimed responsibility for the attack onVoyageurs du Monde [fr]. The hacker group stole some 10,000 identity documents from the company's customer files.[39]
In June 2023, theUnited States Department of Justice announced criminal charges against Ruslan Magomedovich Astamirov, a Russian national, for his alleged participation in the LockBit ransomware campaign as an affiliate. The charges allege that Astamirov directly executed at least five ransomware attacks against victims and received a portion of ransom payments in bitcoin.[40]
At the end of June 2023, theTSMC group fell victim to a ransomware attack via one of its suppliers. LockBit demanded a $70 million ransom.[41]
In July 2023, LockBit attacked thePort of Nagoya in Japan, which handles 10% of the country's trade. The attack forced a shutdown of container operations.[42]
In October 2023, LockBit claimed to have stolen sensitive data fromBoeing.[43] Boeing acknowledged they were aware of a cyber incident affecting some of their parts and distribution business a few days later, though it did not affect flight safety; they did not name the suspected attackers.[44]
In November 2023, LockBit attacked the U.S. subsidiary of the Chinese state-ownedIndustrial and Commercial Bank of China.[45]Bloomberg reported that the US unit of ICBC at the time was considered the world's largest lender by assets.[46]
In November 2023, LockBit released internal data that the group had stolen a month earlier from Boeing onto the Internet.[47]
In November 2023, the LockBit gang attacked theChicago Trading Company andAlphadyne Asset Management.Bloomberg reported that the CTC had been hacked in October, and that over the prior year Lockbit had "become the world’s most prolific ransomware group." Since 2020, it had reportedly carried out 1,700 attacks and extorted $91 million, according to the USCybersecurity and Infrastructure Security Agency.[48]The Register reported in late November 2023 that LockBit was facing growing internal frustrations, and that its leaders were overhauling some of its negotiation methods with victims in response to the low pay rate achieved.[49]
In January 2024, the LockBit gang attackedFulton County computers.[50][51] The county released a statement on the attack the following month, saying they had not paid the ransom, that it was not associated with the election process, they were not aware of any extraction of sensitive information about citizens or employees.[50][51]
In May 2024, the LockBit gang claimed responsibility for an attack on Canadian retailer London Drugs, which closed all locations across Canada. LockBit then threatened to release data within 48 hours if a ransom of $25 million was not paid. London Drugs stated that they were "unwilling and unable to pay ransom" to the parties involved. No customer or primary employee data was compromised. On May 23, 2024, the company confirmed that data had been leaked by Lockbit, and that affected employees were being offered identity theft protection services.
In June 2024, the LockBit gang attacked theUniversity Hospital Center inZagreb, the largest medical facility inCroatia. The cyberattack caused significant disruption, taking the hospital "back 50 years—to paper and pencil". LockBit claimed to have exfiltrated a large number of files, including medical records and employee information, and demanded an undisclosed sum in exchange for not publishing the data. The Croatian government refused the demands.[52][53]
When the LockBit server was closed down by law enforcement in February 2024, it was found that a new version, LockBit-NG-Dev, probably to be released as LockBit 4.0, had been under advanced development;[54]Trend Micro published a detailed report on it.[55]
On February 19, 2024, theNational Crime Agency in collaboration withEuropol and other international law enforcement agencies seized control of darknet websites belonging to the LockBit ransomware gang as a part of Operation Cronos.[56][57][58][7][8] An unverified report said that Lockbit had said that its servers running on theprogramming language PHP had been hit, but that it had backup servers without PHP that were "not touched".[13] One person was arrested in Ukraine, one in Poland, and two in the United States. Two Russians were also named, but have not been arrested. According to Graeme Biggar,Director General of the National Crime Agency, law enforcement has "taken control of their infrastructure, seized their source code, and obtained keys that will help victims decrypt their systems."[12] A decryptor for LockBit 3.0 was made using the seized keys and released for free use onNo More Ransom.[59]
After the takedown, law enforcement posted information about the group on its dark web site, including that it had at least 188 affiliates.[9] Law enforcement also obtained 30,000 Bitcoin addresses used for managing the group's profits from ransom payments, which contained 2,200 BTC ($112 million USD).[60]
As of 22 February 2024 LockBit ransomware was still spreading.[61][9]
On 24 February 2024 a new website claiming to be run by LockBit appeared.[62] The new site listed more than a dozen alleged victims including the FBI, hospitals and Fulton County, Georgia.[62] The new site threatened to release information relating to Fulton County unless a ransom was paid by 2 March 2024.[62] The new site claimed to have the identities of members of a jury in a murder trial.[62] There was also a threat to release Fulton County documents relating to court cases involvingDonald Trump if the ransom wasn't paid.[62]
On 7 May 2024 charges and sanctions were announced against Dmitry Khoroshev, the alleged administrator and developer of LockBit.[63][64]
On 21 May 2024, LockBit claimed responsibility for an attack on the corporate offices of Canadian retail chainLondon Drugs, demanding a payment of $25 million.[65][66] All London Drugs stores were closed nationwide from 28 April–7 May 2024 due to the attack.[67][68] London Drugs is refusing to pay the ransom, and stated that customer and "primary employee" data was not compromised.[65][66]
In June 2024, LockBit claimed responsibility for a major breach ofEvolve Bank & Trust,[69] a partner bank of many financial technology companies includingStripe,Mercury,Affirm, andAirwallex.[70] The group had threatened to leak data from theUS Federal Reserve, but the leaked data appeared to come directly from Evolve, not the Federal Reserve.[71]
{{cite web}}
: CS1 maint: url-status (link) Also available on Spotify:https://open.spotify.com/show/5RHKRk7awU2SFPq2VCwpLidespite the law enforcement operation against LockBit, it seems as though some affiliates are still up and running.
{{cite web}}
: CS1 maint: url-status (link) Also available on Spotify:https://open.spotify.com/show/5RHKRk7awU2SFPq2VCwpLi