Since January 2020, LockBit ransomware has functioned as an affiliate-based ransomware variant; affiliates deploying the LockBit Ransomware-as-a-Service (RaaS) use many varying tactics, techniques, and procedures (TTPs) and attack a wide range of businesses and critical infrastructure organizations, which can make effective computer network defense and mitigation challenging. A new variant, LockBit 3.0, also known as “LockBit Black”, is more modular and evasive than its previous versions, LockBit 2.0 and LockBit, and shares similarities with Blackmatter and Blackcat ransomware. Upon the actual execution of the ransomware within a victim environment, it can further modify the behavior of the ransomware.
A joint cybersecurity advisory (CSA), #StopRansomware: LockBit 3.0 was released recently which details known indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) that the Federal Bureau of Investigation (FBI) investigations correlated with LockBit 3.0 ransomware as recently as March 2023.
Impact
LockBit operators mostly gain access via compromised system, credentials that are obtained from other hackers, phishing emails, or by abuse of (brute forcing) insecure credentials. Once the LockBit, or it’s variants, are executed, it can:
Disable security solutions in the system by using tools like GMER and PC Hunter, some attacks would also create a group policy to disable Windows Defender.
Data exfiltration by using the malware StealBit, LockBit’s proprietary tool, and other tools automates data exfiltration in the latest variants and upload stolen files.
Steal credentials by using tools like Mimikatz to gather credentials.
Discovery and lateral movement by using tools like network scanner, PsExec or Cobalt Strike to discovery other systems and move laterally within a network.
Data Encryption by executing the encryption routine, encryption includes both local and network encryption and appends “.lockbit” to the file extension.
Replace the desktop wallpaper with a note that includes a message about the encryption.
Actions Preventing ‘LockBit’ Attack
Firewall
Enable your firewalls as well as intrusion detection and prevention systems.
Ensure latest signature has been applied on IPS.
Proactively monitor and validate the incoming and outgoing traffic of the network.
Clients & Servers
Ensure PC has up-to-date Windows and software updates.
Ensure up-to-date anti-virus signatures from your anti-virus software such as Kaspersky or Windows Defender updated.
Backup important files regularly and keep them in a separate and safe place.
Beware of phishing emails and DO NOT open email/attachments from unknown/untrusted source.
Ensure all accounts with strong and different password and enable 2FA.
Review the user accounts regularly.
Disable unused ports and services.
Disable command-line and scripting activities and permissions if possible.
Note: these are good security defense-in-depth recommendations for prevention of being infected, but these steps alone do not guarantee against infection.
As a Victim:
Disconnect the system from the network IMMEDIATELY.
DO NOT respond to any kidnapper by attempting payment and instead to report the incident to your departmental IT Support, ITSC and the Police.
This website uses Cookies, including Cookies from Google Analytics, to ensure you get the best browsing experience. If you “Continue” to use this site, you consent to the use of Cookies. Read more about Cookies
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Cookie
Duration
Description
cookielawinfo-checkbox-analytics
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional
11 months
The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy
11 months
The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.