Lockbit ransomware has been around since 2019 but recently released an updated version called Lockbit 2.0. It is another ransomware-as-a-service (RaaS) which is a subscription based model allowing partners to use a full-featured already developed ransomware app ready to carry an attack. On their website, they boast their 2.0 version as being the fastest encryption software as well as the fastest upload of stolen data amongst myriads of many other popular ransomwares, all while highlighting the many features of this ransomware.
Recently, there were reports of targeted attacks with Accenture being the latest prominent victim of this ransomware. For non-payment, Lockbit has started leaking their data on their website to the public.
Infection cycle:
Upon execution of the ransomware, it disables all running security programs and any other means that could permit system recovery. It spawns a cmd exe to run the following commands:
It then proceeds to encrypt the victim’s files. All encrypted files bear the lockbit icon and a .lockbit file extension.
It changes the wallpaper with instructions on how to recover the files as well as adding a text file in every directory where files have been encrypted.
On reboot, the victim can't miss the ransom note because it also adds a run key in the registry which loads an hta file that has the same instructions on how to get the victim's files back.
It then proceeds to delete itself and no copy of the ransomware nor its components is left in the victim machine.
On Lockbit’s website, there are quite a few victims whose data have already been leaked to the public while others still have some days left to submit payment before facing the same consequence.
SonicWall Capture Labs provides protection against this threat via the following signatures:
This threat is also detected by SonicWall Capture ATP with Real-Time Deep Memory Inspection (RTDMI) and the Capture Client endpoint solutions.
Share This Article
An Article By
An Article By
Security News
Security News